Professional Documents
Culture Documents
Fundamentals
Fundamentals
Artificial Intelligence
Beni-Suef University
COMPUTER
Fundamentals
2024
Lecture Notes
Table of Contents
- Introduction
- Data, Information and Program
- Computer Generations
- Components of a computer
- Types of Computers
- Computers in Society
- Introduction
- Bits and Bytes
- Decimal Number System
- Binary Number System
- Hexadecimal Number System
- Decimal to Binary Conversion
- Conversion of Fractional Decimal to Binary
- Conversion of Decimal to Hexadecimal
- Decimal-Hexadecimal Conversion
- How to convert from hex to decimal
- Binary-Hexadecimal Conversion
- Octal Representation
- Signed vs unsigned integers
- Coding Systems for Text-Based Data
- Coding Systems for Other Types of Data
- Electrical Safety
- Computer Components – Functionality Viewpoint
- Computer Components – Devices Viewpoint
- The CPU (Central Processing Unit)
- Cooling Components
- Expansion
- Ports and Connectors
- How the CPU Works
- The System Clock and the Machine Cycle
- Memory Unit
- Input/output Devices
- Storage Devices
- Introduction
- Types of Software
- System Software
- Processing Techniques for Increased Efficiency
- Differences Among Operating Systems
- Categories of Operating Systems
- Operating Systems for Personal Computers and Servers
- Operating Systems for Mobile Devices
- Device Drivers
- Utility Programs
- Application Software
- Software Licensing
- Open Systems
- Open Source Software
- Introduction
- Applications of Networks
- Benefits of Networks
- Types of Networks
- Network Topology
- Network Architectures
- Basics of Networking
- Internet
- World Wide Web (WWW)
- Home Network Hardware
Chapter 6: Computer Security …………………………………………………………………… 127
- Introduction
- Confidentiality
- Integrity
- Availability
- Assurance
- Authenticity
- Anonymity
- Threats and Attacks
- Encryption
- Passwords
- Viruses
- Backup
Chapter 1
An Introduction to
Computers
1
The computer is the loyal friend in whom you record your secrets and
memories. It is the kind friend whose advice and opinions you love to listen
to. It is the trustworthy person whose calculations and decisions you can rely
on. The computer is the virtual world that allows you to roam without
restrictions or compensation, and the world of reality through which you can
buy/sell and profit. The computer is the means of communicating with your
friends, relatives and colleagues. The computer is the only person who
listens to you tirelessly, no matter how young or old you are, poor or rich,
ignorant or knowledgeable.
Some people think that the computer is that desktop or laptop device that he
has always seen at home or laboratory, which is always distinguished by the
keyboard and screen. But if you look carefully, you will find the computer
around us in various forms and types: the car now contains a computer that
enables it to diagnose and solve many of its problems, the factory has
become dependent on the computer in production and product management,
the meteorological centers have a computer to collect information about the
weather and other operations, all stores and shops have computers to
manage sales, cell phones contain computers, and wristwatches often rely
on simple computers for stopwatch and calendar functions.
So, computers are everywhere. From office desks to kitchen tables, from
library tables to people’s laps in coffee shops, the screen and keyboard
combination is a familiar sight. But if you look more carefully, you’ll discover
that computers exist in even more places than you first realize. Cash
registers in stores have computers inside that calculate prices and help
manage inventory. Most cars produced today have diagnostic computers to
help find problems and improve performance.
2
Many workers who once had little use for technology now interact with
computers almost every minute of the workday. At home, people use
computers to read the news, play games, and keep in touch with family and
friends. News from around the world is instantly available. More and more
people have international friends and colleagues, and they can use
computers to communicate.
What is Computer?
A computer is a programmable, electronic device that accepts data, performs
operations on that data, and stores the data.
3
Data, Information and Program
4
Algorithm is defined as a step-by-step procedure or formula for solving a
problem i.e. a set of instructions or procedures for solving a problem. It is
also defined as a mathematical procedure that can usually be explicitly
encoded in a set of computer language instructions that manipulate data. A
computer program (or set of programs) is designed to systematically solve
a problem. The programmer must decide the program requirements,
develop logic and write instructions for the computer in a programming
language that the computer can translate into machine language and
execute. Hence, problem solving is an act of defining a problem,
understanding the problem and arriving at workable solutions. In other
words, problem solving is the process of confronting a novel situation,
formulating connection between the given facts, identifying the goal of the
problem and exploring possible methods for reaching the goal. It requires the
programmer to co-ordinate previous experience and intuition in order to
solve the problem.
Computer Generations
Computers have evolved significantly over the years, and the history of
computers is often divided into generations based on the technology used.
Each generation of computers has built upon the advancements of the
previous generation, leading to the computers we use today. Here are the
five generations of computers:
• First Generation (1940s-1950s): The first computers used vacuum
tubes for processing and magnetic drums for storage. They were large,
expensive, and unreliable.
• Second Generation (1950s-1960s): The second generation of
computers replaced vacuum tubes with transistors, making them
smaller, faster, and more reliable. Magnetic core memory was also
introduced, which was faster and more reliable than magnetic drums.
• Third Generation (1960s-1970s): The third generation of computers
used integrated circuits, which allowed for even smaller and faster
computers. They also introduced magnetic disk storage and operating
systems.
• Fourth Generation (1970s-1980s): The fourth generation of
computers saw the introduction of microprocessors, which made
5
personal computers possible. They also introduced graphical user
interfaces and networking.
• Fifth Generation (1980s-Present): The fifth generation of computers
is still ongoing, and is focused on artificial intelligence and parallel
processing. This generation also saw the development of mobile
computing and the internet.
Components of a Computer
6
Hardware Devices:
As shown in the following figure. Hardware devices are associated with all
five computer operations as follows.
Input Devices:
– Used to input data into the computer
– Keyboards, mice, scanners, cameras, microphones, touch pads,
touch screens, fingerprint readers, etc.
Processing Devices:
– Perform calculations and control computer’s operation
– Central processing unit (CPU) and memory
Output Devices:
– Present results to the user
– Monitors, printers, speakers, projectors, etc.
7
Storage Devices:
– Used to store data on or access data from storage media
– Hard drives, CD/DVD discs and drives, USB flash drives, etc.
Communication Devices:
– Allow users to communicate with others and to electronically access
remote information
– Modems, network adapters, routers, etc.
Software
The programs or instructions used to tell the computer hardware what to do.
Two types of software:
System Software:
– Operating system starts up the computer and controls its
operation
– Without OS, computer cannot function
– Boots the computer and launches programs at the user’s
direction
– Most use a GUI to interact with the user via icons, buttons, tiles,
etc.
– Windows, Mac OS, Linux, Android, etc.
Application Software:
– Performs specific tasks or applications
• Creating letters, budgets, etc.
• Managing inventory and customer databases
• Editing photographs
• Scheduling appointments
• Viewing Web pages
• Exchanging e-mail • Burning DVDs
• Designing homes
8
• Playing games
Examples of application software:
– Word processing programs
– Multimedia programs
– Web browsers
– E-mail programs
9
Types of Computers
Embedded computers:
Embedded computers are everywhere. They are in phones, microwaves,
airplanes, automobiles, calculators… The list goes on and on. An embedded
computer, which is an integral component of most embedded systems, is a
combination of hardware and software that is designated to perform a highly
specific function. For example, the type of embedded computer in a washing
machine will not be the same as the embedded computer in a Nikon camera.
Because the software in embedded computers is designed to only execute
certain tasks, the computer’s software in one device can be totally distinct
from that of another. The hardware of an embedded computer is also
specially designed to withstand stresses in its intended environment. For
instance, an embedded computer installed under the hood of a car is
designed to withstand high temperatures.
Mobile Devices:
A mobile device is a general term for any type of handheld computer. These
devices are designed to be extremely portable, and they can often fit in your
hand. Some mobile devices—like tablets, e-readers, and smartphones—are
powerful enough to do many of the same things you can do with a desktop
or laptop computer.
10
Tablet computers:
Like laptops, tablet computers are designed to be
portable. However, they provide a different computing
experience. The most obvious difference is that tablet
computers don't have keyboards or touchpads.
Instead, the entire screen is touch-sensitive, allowing
you to type on a virtual keyboard and use your finger
as a mouse pointer.
Tablet computers can't necessarily do everything
traditional computers can do. For many people, a
traditional computer like a desktop or laptop is still
needed in order to use some programs. However, the
convenience of a tablet computer means it may be
ideal as a second computer.
E-readers:
E-book readers—also called e-readers—
are similar to tablet computers, except they
are mainly designed for reading e-
books (digital, downloadable books).
Notable examples include the Amazon
Kindle, Barnes & Noble Nook, and Kobo.
Most e-readers use an e-ink display, which
is easier to read than a traditional computer
display. You can even read in bright
sunlight, just like if you were reading a
regular book.
You don't need an e-reader to read e-books.
They can also be read
on tablets, smartphones, laptops,
and desktops.
11
Smartphones:
A smartphone is a more powerful
version of a traditional cell
phone. In addition to the same
basic features—phone calls,
voicemail, text messaging—
smartphones can connect to the
Internet over Wi-Fi or a cellular
network (which requires
purchasing a monthly data plan).
This means you can use a
smartphone for the same things
you would normally do on a computer, such as checking your email,
browsing the Web, or shopping online.
Most smartphones use a touch-sensitive screen, meaning there isn't a
physical keyboard on the device. Instead, you'll type on a virtual keyboard
and use your fingers to interact with the display. Other standard features
include a high-quality digital camera and the ability to play digital music and
video files. For many people, a smartphone can actually replace electronics
like an old laptop, digital music player, and digital camera in the same device.
Personal computers
Computer could be classified as single-user and multi-user computer. The
former one (known as personal computers (PCs)) is designed to be used by
only one person at a time, while the later one is designed to work by multiple
users. Personal computers may have separate work spaces and storage for
several different users (those in a computer lab are probably set up that way),
but only one user can work with the machine at a time. Personal computers
are also called microcomputers because they are among the smallest
computers created for people to use. Although personal computers are used
by individuals, they can be connected together to create networks, allowing
users to share information from computer to computer.
Multi-users computers are created to handle the needs of many users at the
same time. These powerful systems are most often used by businesses or
schools, and are commonly found at the heart of an organization’s network.
Each user interacts with the computer through his or her own input and
12
output hardware, freeing people from having to wait their turn at a single
keyboard and monitor. The largest organizational computers support
thousands of individual users at the same time, from thousands of miles
away. While some of these large-scale systems are devoted to a special
purpose, enabling users to perform only a few specific tasks, many
organizational computers are general-purpose systems that support a wide
variety of tasks.
Desktop computers:
Desktop computers are personal
computers designed for regular
use at a single location on or near
a desk or table due to its size and
power requirements. Desktop
computers are powerful and
versatile, and they are used for an
amazing array of tasks. Not only
do these machines enable people
to do their jobs with greater ease and efficiency, but they can be used to
communicate, produce music, edit photographs and videos, play
sophisticated games, and much more. Used by everyone from preschoolers
to nuclear physicists, desktop computers are indispensable for learning,
work, and play. As its name implies, a desktop computer is a full-size
computer that is too big to be easily carried around. The main component of
a desktop PC is the system unit, which is the case that houses the
computer’s critical parts, such as its processing and storage devices.
Workstations:
A workstation is a special
computer designed for
technical or scientific
applications. It has more power
and features than a standard
desktop PC. These machines
are popular among scientists,
engineers, and animators who
need a system with greater-
than-average speed and the
13
power to perform sophisticated tasks. Workstations often have large, high-
resolution monitors and accelerated graphics-handling capabilities, making
them suitable for advanced architectural or engineering design, modeling,
animation, and video editing.
Servers
14
Today, most organizations’ networks are based on personal computers.
Individual users have their own desktop computers, and those computers
are linked together in a network to allow convenient file and information
sharing between users. When all people use their computers for a common
purpose (for example, running e-mail programs or working on documents),
a special, central computer called a network server is added to the network.
A network server is a powerful personal computer with special software and
equipment that enable it to function as the primary computer in the network.
15
Web server:
An open-source web server is used for accessing the world wide web
through public domain software. These servers connect stored information
from an internet website to your own computer. Web servers store
information for the internet that is retrieved via "HTTP" code and sent to your
web browser. This is one of the most widely used types of servers.
Proxy Server:
Proxy servers act as a bridge between a host server and a client server. A
proxy sends data from a website to your computer IP address after it passes
through the proxy's server. This practice adds a layer of security since the
information is requested then transferred from the source to the proxy server
and never directly from a client to another user. A proxy server can filter out
various harmful internet entities.
Application server:
These servers connect clients to software applications through virtual server
connections. This allows users to bypass downloading data to their own
hardware in order to access applications. Application servers can effectively
host large amounts of application data to many users at once, making them
ideal for businesses.
File server:
A file server stores data files for multiple users. They allow for faster data
retrieval and saving or writing files to a computer. This is a basic type of
server used commonly by organizations where lots of users need access to
files that are more conveniently and safely stored on a server than a personal
computer.
16
Database server:
Database servers function as large storage spaces that organizations use
and access to run multiple programs to meet their needs. A database server
can run independently of any database architecture.
Mail server:
A mail server stores and delivers mail for clients through email service
platforms. Because mail servers are set up to continually connect to a
network, individual users can access their email without running any systems
through their own devices.
Mainframe computers:
Supercomputers are the most powerful computers and physically they are
some of the largest. These systems can process huge amounts of data, and
the fastest supercomputers can perform nearly two quadrillion calculations
per second. Some supercomputers link together hundreds of thousands of
processors. Supercomputers are ideal for handling large and highly complex
problems that require extreme calculating power. For example,
supercomputers are actively used in the mapping of the human genome,
forecasting weather, and modeling complex processes like nuclear fission. It
can cost several million dollars each. Supercomputers tend to be very large
and contain a large number of CPUs. Titan is one of the fastest computers
in the world.
18
Computers in Society
People can list countless reasons for the importance of computers. For
someone with a disability, for example, a computer may offer freedom to
communicate, learn, or work without leaving home. For a sales professional,
a PC may mean the ability to communicate whenever necessary, track leads,
and to manage an ever-changing schedule. For a researcher, a computer
may be the workhorse that does painstaking and time-consuming
calculations. Let’s take a look at where computers are found in our society
and what they do there.
Computers at Home:
19
- Entertainment: Computers and video game consoles are intensely
popular, with an endless variety of games from solitaire to simulating
your own living room rock band. People can play games alone, with a
family member, or go online to play with tens of thousands of others in
a single, massive fantasy or sci-fi world. PCs can also serve as media
centers, storing music, videos, and movies for on-demand playback on
other computers, consoles, and televisions throughout the home.
- Creativity: Poetry, music, painting, essays on the state of the world,
funny stories—these once required publishers and marketing efforts to
produce. Now, with blogs, personal Web pages, and Web sites for
sharing pictures and video clips, people can create anything to their
hearts’ content and share it with an audience.
- Finances and Shopping: Home users rely on their PCs for bill paying,
investing, and other financial chores. They also use computers to
spend what they earn, shopping online for everything from cars to
collectibles. Many of the users now rely on Internet to sell their old cars,
used mobiles, etc.
Computers in Education:
20
Computers in Business:
21
Chapter 2
Number Systems
22
Introduction
There are several kinds of data such as, numeric, text, date, graphics,
image, audio and video that need to be processed by a computer. The text
data usually consist of standard alphabetic, numeric, and special
characters. The graphics data consist of still pictures such as drawings and
photographs. Any type of sound, including music and voice, is considered
as audio data. Video data consist of motion pictures. The data has to be
converted into a format that the computer understands. Data can be
classified into two forms, analog data and digital data. Analog data can
have any value within a defined range and it is continuous. Sound waves,
telephone signals, temperatures and all other signals that are not broken
into bits are examples of analog data. Digital data can be represented by a
series of binary numbers and it is discrete.
The Arithmetic and Logic Unit (ALU) of the computer performs arithmetic
and logical operations on data. Computer arithmetic is commonly
performed on two different types of numbers, integer and floating point. As
the hardware required for arithmetic is much simpler for integers than
floating point numbers, these two types have entirely different
representations. An integer is a whole number and the floating-point
number has a fractional part. To understand about how computers store
data in the memory and how they handle them, one must know about bits
and bytes and the number systems.
Bits and bytes are common computer jargons. Both the main memory
(Random Access Memory or RAM) and the hard disk capacities are
measured in terms of bytes. The hard disk and memory capacity of a
computer and other specifications are described in terms of bits and bytes.
For instance, a computer may be described as having a 32-bit Pentium
processor with 128 Megabytes of RAM and hard disk capacity of 100
Gigabytes.
23
faster in binary form than they can use decimal representations. It is
important for every one studying computers to know how the binary system
and hexadecimal system work. A bit is small piece of data that is derived
from the words “binary digit”. Bits have only two possible values, 0 and 1. A
binary number contains a sequence of 0s and 1s like 10111. A collection of
8 bits is called as a byte. With 8 bits in a byte, we can represent 256 values
ranging from 0 to 255 as shown below:
0 = 0000 0000
1 = 0000 0001
2 = 0000 0010
3 = 0000 0011
………….
………….
………….
254 = 1111 1110
255 = 1111 1111
24
In a 2GB (Gigabytes) storage device (hard disk), totally 21,47,483,648
bytes can be stored. Nowadays, databases having size in Terabytes are
reported; Zetta and Yotta size databases are yet to come.
25
(948)10 = 9 X 102 + 4 X 101 + 8 X 100
Fractional values are represented in the same manner, but the exponents
are negative for digits on the right side of the decimal point. Thus the value
of the fractional decimal sequence 948.23 is:
(948.23)10 = 9 X 102 + 4 X 101 + 8 X 100 + 2 X 10-1 + 3 X 10-2
26
Hexadecimal Number System
Hexadecimal representation of numbers is more efficient in digital
applications because it occupies less memory space for storing large
numbers. A hexadecimal number is represented using base 16.
Hexadecimal or Hex numbers are used as a shorthand form of binary
sequence. This system is used to represent data in a more compact
manner. In the hexadecimal number system, the binary digits are grouped
into sets of 4 and each possible combination of 4 binary digits is given a
symbol as follows:
27
The hexadecimal representation is more compact than binary
representation. It is very easy to convert between binary and hexadecimal
systems. Each hexadecimal digit will correspond to four binary digits
because 24 = 16. The hexadecimal equivalent of the binary sequence
(110010011101)2 is:
1100 1001 1101 = (C9D)16
C 9 D
Repeated Division by 2
Any decimal number divided by 2 will leave a remainder of 0 or 1.
Repeated division by 2 will leave a string of 0s and 1s that become the
binary equivalent of the decimal number. Suppose it is required to convert
the decimal number M into binary form, dividing M by 2 in the decimal
system, we will obtain a quotient M1 and a remainder r1, where r1 can have
a value of either 0 or 1.
M = 2 * M1 + r1 ; r1 = 0 or 1
Next divide the quotient M1 by 2. The new quotient will be M2 and the new
remainder r2.
M1 = 2 * M2 + r2; r2 = 0 or 1
so, M = 2 (2 * M2 + r2) + r1
= M2 X 22+ r2 X 21 + r1 X 20
Next divide the quotient M2 by 2. The new quotient will be M3 and the new
remainder r3.
M2 = 2 X M3 + r3
So, M = 2 (2 X (2 X M3 + r3) + r2) + r1
= 22(2 X M3 + r3) + r2 X 21 + r1 X 20
= M3 X 23+ r3 X 22 + r2 X 21 + r1 X 20
28
The above process is repeated until the quotient becomes 0, then
M = 1 X 2k + rk X 2k-1 + …. + r3 X 22 + r2 X 21 + r1 X 20
Example:
Convert (23)10 into its equivalent binary number.
To write the binary equivalent of the decimal number, read the remainders
from the bottom upward as:
(23)10 = (10111)2
The number of bits in the binary number is the exponent of the smallest
power of 2 that is larger than the decimal number. Consider a decimal
number 23. Find the exponent of the smallest power of 2 that is larger than
23.
16 < 23 < 32
24 < 23 < 25
Example:
What is the number of bits in the binary representation of the decimal
number 36 without actually converting into its binary equivalent?
The next immediate large number than 36 that can be represented in
powers of 2 is 64.
32 < 36 < 64
25 < 36 < 26
29
Hence, the number 36 should have 6 bits in its binary representation.
Sum of Powers of 2
A decimal number can be converted into a binary number by adding up the
powers of 2 and then adding bits as needed to obtain the total value of the
number. For example, to convert (36)10 to binary:
- Find the largest power of 2 that is smaller than or equal to 36
(36)10 > (32)10
- Set the 32’s bit to 1 and subtract 32 from the original number.
[36 – 32 = 4]
- 16 is greater than the remaining total. Therefore, set the 16’s bit to 0
- 8 is greater than the remaining total. Hence, set the 8’s bit to 0
- As the remaining value is itself in powers of 2, set 4’s bit to 1 and
subtract 4. [4 – 4 = 0]
Example:
Convert (91)10 to binary using the sum of powers of 2 method.
The largest power of 2 that is smaller than or equal to 91 is 64.
30
64 32 16 8 4 2 1
1 91- 64 = 27
64 32 16 8 4 2 1
1 0 1 91-(64+16) = 11
64 32 16 8 4 2 1
1 0 1 1 91-(64+16+8)= 3
64 32 16 8 4 2 1
1 0 1 1 0 1 91-(64+16+8+2) = 1
64 32 16 8 4 2 1
1 0 1 1 0 1 1 91-(64+16+8+2+1) = 0
The decimal fractions like 1/2, 1/4, 1/8 etc., can be converted into exact
binary fractions. Sum of powers method can be applied to these fractions.
(0.5)10 = 1 X 2-1 = (0.1)2
(0.25)10 = 0 X 2-1 + 1 X 2-2 = (0.01)2
(0.125)10 = 0 X 2-1 + 0 X 2-2 + 1 X 2-3 = (0.001)2
The fraction 5/8 = 4/8 + 1/8 = 1/2 + 1/8 has the binary equivalent:
5/8 = 1 X 2-1 + 0 X 2-2 + 1 X 2-3
= (0.101)2
Exact conversion is not possible for the decimal fractions that cannot be
represented in powers of 2. For example, (0.2)10 cannot be exactly
represented by a sum of negative powers of 2. A method of repeated
multiplication by 2 has to be used to convert such kind of decimal fractions.
The steps involved in the method of repeated multiplication by 2:
31
- Multiply the decimal fraction by 2 and note the integer part. The
integer part is either 0 or 1.
- Discard the integer part of the previous product. Multiply the fractional
part of the previous product by 2. Repeat the first step until the
fraction repeats or terminates.
The resulting integer part forms a string of 0s and 1s that become the
binary equivalent of the decimal fraction.
Example:
32
number 948, when converted into hexadecimal number has 3 hexadecimal
digits.
(163 = 4096) > 948 > (162 = 256)
Hence, the hexadecimal representation of 948 has 3 hex digits. The
conversion process is as follows:
162 161 160
3 948 – (3 X 256) = 180
162 161 160
3 B 948 – (3 X 256 + 11 X 16) = 4
162 161 160
3 B 4 948 – (3 X 256 + 11 X 16 + 4) = 0
Hence, (948)10 = (3B4)16
Example:
33
Decimal-Hexadecimal Conversion
Hexadecimal to decimal: expand using positional notation
Conversion steps:
1. Divide the number by 16.
2. Get the integer quotient for the next iteration.
3. Get the remainder for the hex digit.
4. Repeat the steps until the quotient is equal to 0.
Example 1;
Convert 756210 to hex:
Division Quotient Remainder Remainder
Digit #
by 16 (integer) (decimal) (hex)
7562/16 472 10 A 0
472/16 29 8 8 1
29/16 1 13 D 2
1/16 0 1 1 3
So 756210 = 1D8A16
Example 2:
Convert 3563110 to hex:
Division Remainder Remainder
Quotient Digit #
by 16 (decimal) (hex)
35631/16 2226 15 F 0
2226/16 139 2 2 1
139/16 8 11 B 2
8/16 0 8 8 3
34
So 3563110 = 8B2F16
Example 1:
3B in base 16 is equal to each digit multiplied with its corresponding 16n:
3B16 = 3×161+11×160 = 48+11 = 5910
Example 2:
E7A9 in base 16 is equal to each digit multiplied with its corresponding 16n:
E7A916 = 14×163+7×162+10×161+9×160 = 57344+1792+160+9 = 5930510
Example 3:
0.8 in base 16:
0.816 = 0×160+8×16-1 = 0+0.5 = 0.510
Binary-Hexadecimal Conversion
Binary Hex
0000 0
0001 1
0010 2
0011 3
0100 4
0101 5
35
0110 6
0111 7
1000 8
1001 9
1010 A
1011 B
1100 C
1101 D
1110 E
1111 F
Example:
Convert binary 11011002 to hex:
Convert every 4 binary bits (from bit0) to hex digit:
11011002 = 110 1100 = 6 C = 6C16
36
7 0111
8 1000
9 1001
A 1010
B 1011
C 1100
D 1101
E 1110
F 1111
Example;
Convert hex 6C16 to binary:
6C16 = 6 C = 110 1100 = 11011002
Octal Representation
37
Hence (64)10 = (100)8
38
Unsigned Numbers:
Unsigned numbers don’t have any sign, these can contain only magnitude
of the number. So, representation of unsigned binary numbers are all
positive numbers only. For example, representation of positive decimal
numbers are positive by default. We always assume that there is a positive
sign symbol in front of every number.
39
= (92)10
= (1x26+0x25+1x24+1x23+1x22+0x21+0x20)10
= (1011100)2
Signed Numbers:
40
Sign-Magnitude form:
For n bit binary number, 1 bit is reserved for sign symbol. If the value of
sign bit is 0, then the given number will be positive, else if the value of sign
bit is 1, then the given number will be negative. Remaining (n-1) bits
represent magnitude of the number. Since magnitude of number zero (0) is
always 0, so there can be two representation of number zero (0), positive
(+0) and negative (-0), which depends on value of sign bit. Hence these
representations are ambiguous generally because of two representation of
number zero (0). Generally, sign bit is a most significant bit (MSB) of
representation. The range of Sign-Magnitude form is:
from (2(n-1)-1) to (2(n-1)-1).
For example, range of 6 bit Sign-Magnitude form binary number is
from (25-1) to (25-1) which is equal from minimum value -31 (i.e., 1 11111)
to maximum value +31 (i.e., 0 11111). And zero (0) has two
representation, -0 (i.e., 1 00000) and +0 (i.e., 0 00000).
42
Unicode – Newer code (32 bits per character is common) – Universal
coding standard designed to represent textbased data written in any
ancient or modern language – Replacing ASCII as the primary text-coding
system.
43
– More bits = more colors
Audio Data:
Video Data
Machine language:
45
Chapter 3
Computer Hardware
46
Electrical Safety
Before going ahead to discuss the details of the computer components, it is
important to know that electrical devices have certain power requirements.
For example, the AC adapter is manufactured for a specific laptop.
Exchanging the adapter with another different type of laptop may cause
damage to both the AC adapter and the laptop. It is important to check the
manual of any device to prevent electrical fires, injuries, and fatalities. Also,
when trying to open or fix the computer from inside, take care of the
Electrostatic discharge (ESD). ESD is occurred when there is a buildup of
an electric charge that exists on a surface which meets another differently
charged surface. It can cause damage to computer equipment if not
discharged properly. To prevent ESD damage, it is important to follow the
following main instructions:
▪ Keep all components in antistatic bags until you are ready to install
them.
▪ Use grounded mats on workbenches.
▪ Use grounded floor mats in work areas.
▪ Use antistatic wrist straps when working inside computers.
47
▪ Store the data and program and retrieve as and when required.
▪ Process the data as per instructions given by the program and
convert it into useful information
▪ Communicate the information as output
Input Unit:
A computer uses input devices to accept the data and program. Input
devices are the tools that allow communication between the user and the
computer. In modern computers keyboard, mouse, light pen, touch screen
etc, are some of the input devices.
Output Unit:
Similar to input devices, output devices have an interface between the
computer and the user. These devices take machine coded output results
from the processor and convert them into a form that can be used by
human beings. In modern computers, monitors (display screens) and
printers are the commonly used output devices.
48
Central Processing Unit:
CPU is the brain of any computer system. It is just like the human brain that
takes all major decisions, makes all sorts of calculations and directs
different parts of the computer function by activating and controlling the
operation. It consists of arithmetic and logic units, control unit and internal
memory (registers). The control unit of the CPU coordinates the action of
the entire system. Programs (software) provide the CPU a set of
instructions to follow and perform a specific task. Between any two
components of the computer system, there is a pathway called a bus which
allows for the data transfer between them. Control unit controls all the
hardware operations, ie, those of input units, output units, memory unit and
the processor. The arithmetic and logic units in computers are capable of
performing addition, subtraction, division and multiplication as well as some
logical operations. The instructions and data are stored in the main memory
so that the processor can directly fetch and execute them.
The CPU speed, or processor speed, is the amount of cycles that a CPU
can perform per second. This is otherwise known as a Hertz. For example,
one Hertz means that one cycle can be completed in one second. A
megahertz means that one million cycles can be completed in a second. A
gigahertz, the most common form of processor speed, means that one
billion cycles can be completed per second.
Clock speeds are useful when comparing similar CPUs in the same family.
For example, let’s say you’re comparing two Intel Haswell Core i5 CPUs,
which only differ in their clock rate. One runs at 3.4 GHz, and one runs at
2.6 GHz. In this case, the 3.4 GHz processor will perform 30% faster when
they’re both running at their top speed. This is true because the processors
are otherwise the same. But you can’t compare the Haswell Core i5’s CPU
clock rate against another type of CPU, such as an AMD CPU, ARM CPU,
or even an older Intel CPU. Later, we shall give more details about CPU.
49
Memory Unit:
In the main memory, the computer stores the program and data that are
currently being used. In other words since the computers use the stored
program concept, it is necessary to store the program and data in the main
memory before processing. The main memory holds data and program only
temporarily. Hence there is a need for storage devices to provide backup
storage. They are called secondary storage devices or auxiliary memory
devices. Secondary storage devices can hold more storage than main
memory and is much less expensive.
50
Now, we shall discuss most of the components inside the system units
briefly as follows:
Case:
The case includes most (sometimes all) of the internal components such as
the power supply, motherboard, central processing unit (CPU), memory,
disk drives, and assorted adapter cards. Desktop computers have cases of
different forms:
➢ Full-Size Tower
➢ Horizontal case
➢ All-in-one
Power Supply:
A power supply is used to convert AC
power into a lower voltage DC power
required by internal components. The
51
power supply of a Desktop computer has different forms:
Drive Bays:
– Rectangular metal racks inside the system unit that house storage
devices such as:
• Hard drive, CD/DVD drive, flash memory card reader
• Connected to the motherboard with a cable
52
Motherboard:
– Computer Chip:
• Very small pieces of silicon or other semi-conducting material onto
which integrated circuits are embedded
– Circuit Board:
• A thin board containing computer chips and other electronic
components
– System Board:
• The main circuit board inside the system unit to which all devices
must connect
53
• Memory slots into which the system's main memory is to be installed,
typically in the form of DIMM modules containing DRAM chips can
be DDR3, DDR4 or DDR5.
• The chipset which forms an interface between the CPU, main
memory, and peripheral buses.
• Non-volatile memory chips (usually Flash ROM in modern
motherboards) containing the system's firmware or BIOS.
• The clock generator which produces the system clock signal to
synchronize the various components.
• Slots for expansion cards (the interface to the system via the buses
supported by the chipset).
• Power connectors, which receive electrical power from the
computer power supply and distribute it to the CPU, chipset, main
memory, and expansion cards.
• Connectors for hard disk drives, optical disc drives, or solid-state
drives, typically SATA and NVMe now.
54
The GPU (graphics processing unit)
Processing Speed:
Word Size: The amount of data that a CPU can manipulate at one time;
typically 32 or 64 bits.
55
Cache Memory: Special group of very fast memory chips located on or
close to the CPU. Level 1 is fastest, then Level 2, then Level 3. More cache
memory typically means faster processing. Usually internal cache (built into
the CPU).
Bus Width, Bus Speed, and Bandwidth: A bus is an electronic path over
which data can travel. It found inside the CPU and on the motherboard.
Bus width is the number of wires in the bus over which data can travel. A
wider bus allows more data to be transferred at one time
Cooling Components
Fans:
– Fans used on most personal computers to help cool the CPU and
system unit
– Heat is an ongoing problem for CPU and computer manufacturers
• Can damage components
• Cooler chips run faster
Heat Sinks:
56
– Small components typically made out of aluminum with fins that
help to dissipate heat
Cooling Systems:
– Liquid cooling systems: Cool the computer with liquid-filled tubes
– Immersion cooling: Hardware is actually submerged into units filled
with a liquid cooling solution
– Notebook cooling stand: Cools the underside of a notebook
computer
– Other cooling methods, such as ion pump cooling systems, are
under development
Expansion
Expansion Slot:
• A location on the motherboard into which expansion cards are
inserted
Expansion Card:
• A circuit board inserted into an expansion slot
• Used to add additional functionality or to attach a peripheral device
ExpressCard Modules:
• Designed to add additional functionality to notebooks
57
Buses:
A Bus is an electronic path within a computer over which data travel. It is
located within the CPU and etched onto the motherboard.
Expansion Bus:
• Connects the CPU to peripheral (typically input and output) devices
Memory Bus:
• Connects CPU directly to RAM
Frontside Bus (FSB):
• Connects CPU to the chipset that connects the CPU to the rest of
the bus architecture
PCI and PCI Express (PCIe) Bus:
• PCI has been one of the most common types
• Today, PCI Express bus, which is extremely fast, has replaced the
PCI bus
Universal Serial Bus (USB):
• Extremely versatile
• Allows 127 different devices to connect to a computer via a single
USB port
FireWire Bus:
• Developed by Apple to connect multimedia devices to a computer
58
Ports and Connectors
• Usually have a USB port, HDMI port, and/or flash memory card slot
• Flash memory cards often use the Secure Digital (SD) format
• MiniSD and microSD cars are smaller than regular SD cards
59
How the CPU Does Work
Moore’s Law:
– In 1965, Gordon Moore predicted that the number of transistors per
square inch on chips had doubled every two years and that trend would
continue
– Moore’s Law is still relevant today for processors as well as other
computer components
60
– Floating Point Unit (FPU): It performs decimal arithmetic
– Control Unit: It coordinates and controls activities within a CPU core
– Prefetch Unit: It attempts to retrieve data and instructions before
they are needed for processing in order to avoid delays
– Decode Unit: It translates instructions from the prefetch unit so they
are understood by the control unit, ALU, and FPU
– Registers and Internal Cache Memory: Store data and instructions
needed by the CPU
– Bus Interface Unit: It allows the core to communicate with other
CPU components
61
• Number of cycles per second is measured in hertz (Hz)
• One megahertz = one million ticks of the system clock
• Many PC system clocks run at 200 MHz
• Computers can run at a multiple or fraction of the system clock
speed
• A CPU clock speed of 2 GHz means the CPU clock “ticks” 10 times
during each system clock tick • During each CPU clock tick, one or
more pieces of microcode are processed
• A CPU with a higher clock speed processes more instructions per
second than the same CPU with a lower CPU clock speed
Machine Cycle:
The series of operations involved in
the execution of a single machine
level instruction.
62
Instruction Cycle: is the time needed to execute only one instruction in a
program. It has two main steps:
• Fetch/Decode
• Execute
Therefore, executing a program means that iteratively executing the two
main steps until the program terminated.
63
The results of executing the first cycle (LOAD 10):
64
The results of executing the second cycle (ADD 11):
65
Memory Unit:
Memory units are the storage areas in a computer. The term “memory”
usually refers to the main memory of the computer, whereas, the word
“storage” is used for the memory that exists on disks, CDs, floppies or
tapes. The main memory is usually called a physical memory which refers
to the ‘chip’ (Integrated Circuit) capable of holding data and instruction.
There are different types of memory. They are Random Access Memory
(RAM), Read Only Memory (ROM), Programmable Read-Only Memory
(PROM), Erasable Programmable Read-Only Memory (EPROM),
Electrically Erasable Programmable Read-Only Memory (EEPROM).
RAM is the most common type of memory found in the modern computers.
This is really the main store and is the place where the program gets
stored. When the CPU runs a program, it fetches the program instructions
from the RAM and carries them out. If the CPU needs to store the results of
the calculations it can store them in RAM. When we switch off a computer,
whatever is stored in the RAM gets erased. It is a volatile form of memory.
Read Only Memory - ROM
In ROM, the information is burnt (pre-recorded) into the ROM chip at
manufacturing time. Once data has been written into a ROM chip, it cannot
be erased but you can read it. When we switch off the computer, the
contents of the ROM are not erased but remain stored permanently. ROM
is a non-volatile memory. ROM stores critical programs such as the
program that boots the computer. Types of Read-only Memory (ROM)
include:
66
• ROM chips.
• PROM chips.
• EPROM chips
• EEPROM chips.
The main memory must store many data items and have some way of
retrieving them when they are needed. The memory can be compared to
the boxes at a post office. Each box-holder has a box with a unique number
which is called its address. This address serves to identify the box. The
memory has a number of locations in its store. Each location in a memory
has a unique number called its memory address. This serves to identify it
for storage and retrieval. Operations on memories are called reads and
writes, defined from the perspective of a processor or other device that
uses a memory: a write instruction transfers information from other device
to memory and a read instruction transfers information from the memory to
other devices. A memory that performs both reads and writes is often
called a RAM, random access memory. Other types of memories
commonly used in systems are read-only memory.
Input Devices
An input device is used to feed data into a computer. For example, a
keyboard is an input device. It is also defined as a device that provides
communication between the user and the computer. Input devices are
capable of converting data into a form which can be recognized by
computer. A computer can have several input devices.
Keyboard
The most common input
device is the keyboard.
Keyboard consists of a set
of typewriter like keys that
67
enable you to enter data into a computer. They have alphabetic keys to
enter letters, numeric keys to enter numbers, punctuation keys to enter
comma, period, semicolon, etc., and special keys to perform some specific
functions. The keyboard detects the key pressed and generates the
corresponding ASCII codes which can be recognized by the computer.
Mouse
Mouse is an input device that controls
the movement of the cursor on the
display screen. Mouse is a small device,
you can roll along a flat surface. In a
mouse, a small ball is kept inside and
touches the pad through a hole at the
bottom of the mouse. When the mouse is moved, the ball rolls. This
movement of the ball is converted into signals and sent to the computer.
You will need to click the button at the top of the mouse to select an option.
Mouse pad is a pad over which you can move a mouse. Mouse is very
popular in modern computers.
Scanner
Scanner is an input device that allows
information such as an image or text
to be input into a computer. It can
read image or text printed on a paper
and translate the information into a
form that the computer can use. That
is, it is used to convert images
(photos) and text into a stream of
data. They are useful for publishing
and multi-media applications.
68
the barcodes and transmits to the computer for further processing. The
system gives fast and error-free entry of information into the computer.
Digital Camera
The digital camera is an input device
mainly used to capture images. The digital
camera takes a still photograph, stores it
and sends it as digital input to the
computer. It is a modern and popular input
device.
Light Pen
A light pen is a pointing device
shaped like a pen and is
connected to a monitor. The tip
of the light pen contains a light
sensitive element which, when
placed against the screen,
detects the light from the
screen enabling the computer
to identify the location of the pen on the screen. Light pens have the
advantage of ‘drawing’ directly onto the screen, but this can become
uncomfortable, and they are not accurate.
69
Magnetic Reader
Magnetic reader is an input device
which reads a magnetic strip on a
card. It is handy and data can be
stored and retrieved. It also provides
quick identification of the card’s
owner. All the credit cards, ATM
cards (banks), petro cards, etc. stores
data in a magnetic strip which can be
read easily by the magnetic reader.
Smart Cards
This input device stores data
in a microprocessor
embedded in the card. This
allows information, which can
be updated, to be stored on
the card. These data can be
read and given as input to the
computer for further
processing. Most of the identification cards use this method to store and
retrieve the vital information.
Microphone
Microphone serves as a voice input device.
It captures the voice data and input to the
computer. Using the microphone along with
speech recognition software can offer a
completely new approach to input
information into your computer. Speech
recognition programs, although not yet
completely exact, have made great strides
in accuracy as well as ease of use. The
voice-in or speech recognition approach can
almost fully replace the keyboard and mouse. Speech recognition can now
open the computer world to those who may have been restricted due to a
70
physical handicap. It can also be a boon for those who have never learned
to type.
Output Devices
Output is anything that comes out of a computer. An output device is
capable of presenting information from a computer. There are many output
devices attached with the computers. But the monitors and printers are
commonly used output devices.
Monitors
Monitor is a commonly used output
device, sometimes called as a display
screen. It provides a visual display of
data. Monitors are connected with the
computer and are similar in appearance
to a television set.
Printers
Printer is an output device that prints text or images on paper or other
media (like transparencies). By printing you create what is known as a
‘hard copy’. There are different kinds of printers, which vary in their speed
and print quality. The two main types of printers are impact printers and
non-impact printers.
71
Impact printers include all printers that print by striking an ink ribbon.
Impact printers use a print head containing a number of metal pins which
strike an inked ribbon placed between the print head and the paper. Line
printers, dot matrix printers are some of the impact printers.
Non-impact printers are much quieter than impact printers as their printing
heads do not strike the paper. Non-impact printers include laser printers,
inkjet printers and thermal printers.
Non-impact printers are faster than impact printers because they have
fewer moving parts. They are quiet than impact printers because there is
no striking mechanism involved. They posses the ability to change
typefaces automatically. These printers produce high-quality graphics.
These printers usually support the transparencies. These printers cannot
print multipart forms because no impact is being made on the paper.
72
Line Printer
Line printers are high-speed printers capable of printing an entire line at a
time. A line printer can print 150 lines to 3000 lines per minute. The
limitations of line printer are they can print only one font, they cannot print
graphics, the print quality is low and they are noisy to operate. But it can
print large volume of text data very fast compared to the other printers. It is
also used to print on multipart stationeries to prepare copies of a document.
Laser Printers
Laser printers use a laser beam
and dry powdered ink to produce
a fine dot matrix pattern. It can
produce very good quality of
graphic images. One of the chief
characteristics of laser printers is
their resolution – how many dots
per inch (dpi) they lay down. The
available resolutions range from
300 dpi at the low end to
around 1200 dpi at the high
end.
Inkjet Printers
Inkjet printers use color
cartridges which combine
73
magenta, yellow and cyan inks to create color tones. A black cartridge is
also used for crisp monochrome output. Inkjet printers work by spraying
ionizing ink at a sheet of paper. Magnetized plates in the ink’s path direct
the ink onto the paper in the described shape.
Speakers
The computer can also give produce voice
output(audio data). Speaker serves as a voice
output device. Using speakers along with speech
synthesizer software, the computer can provide
voice output. Voice output has become very
common in many places like airlines, banks,
automatic telephone enquiry system etc. Users
can also hear music/songs using the voice output
system.
Plotters
Apart from the output devices like printers,
plotters are also used to produce graphical
output. Although printer output is very
convenient for many purposes, the user
needs to present the information
graphically in order to understand its
significance.
Storage
74
Storage System Characteristics
Logical vs. Physical Representation: Data are stored as files and are
organized in different folders with a particular structure.
– File
• Anything stored on a storage medium, such as a program,
document, digital image, or song
– Filename
• Name given to a file by the user
– Folder
• Named place on a storage medium into which files can be
stored
Some of the commonly used storage devices are hard disks, magnetic
tapes, floppy disks and CD-ROM. To understand the physical mechanism
of secondary storage devices one must have knowledge of magnetism,
75
electronics and electro mechanical systems. The average time required to
reach a storage location and obtain its contents is called its access time. In
electromechanical devices with moving parts such as disks and tapes, the
access time consists of a seek time required to position the read write head
to a location and transfer time required to transfer the data to or from the
device. Data storage devices can be classified according to the media on
which the data is stored:
• Magnetic – like hard disk drive, tape drive and Floppy disk drive
• Optical – like CD and DVD
• Electrons (flash memory media)
Hard Disk
Hard disk is a magnetic disk
on which you can store
computer data. The hard disk
is a direct-access storage
medium. This means you can
store and retrieve data
randomly. Disk storage
systems are essentially based
on magnetic properties. The
magnetic disk consists of high
speed rotating surfaces
coated with a magnetic
recording medium. The rotating surface of the disk is a round flat plate.
When writing data, a write head magnetizes the particles on the disk
surface as either north or south poles. When reading data, a read head
converts the magnetic polarizations on the disk surface to a sequence of
pulses. The read and write heads are generally combined into a single
head unit. There may be more than one read/write head. Data is arranged
as a series of concentric rings. Each ring (called a track) is subdivided into
a number of sectors, each sector holding a specific number of data
elements (bytes or characters).
76
The smallest unit that can be written to or read from the disk is a sector.
Once a read or write request has been received by the disk unit, there is a
delay involved until the required sector reaches the read/write head. This is
known as rotational latency, and on average is one half of the period of
revolution. The storage capacity of the disk is determined as (number of
tracks * number of sectors * bytes per sector * number of read/write heads)
Thus, the data is stored as magnetized spots arranged in concentric circles
(tracks) on the disk. Each track is divided into sectors. The arrangement of
tracks and sectors on a disk is known as its ‘format’. High data rates
demand that the disk rotates at a high speed (about 3,600 rpm). As the disk
rotates read/write heads move to the correct track and fetch the desired
data. The storage capacity of a hard disk can be Gigabytes (GB), i.e.
thousands of Megabytes of information.
77
– Commonly used to transport large amounts of data from one c
omputer to another
– Portable external hard drives are smaller and easier to transport
– Most connect with a USB connection although some may be
wireless
78
Hard Drive Partitioning and File Systems:
Partitioning:
– Divides the physical capacity of a single drive logically into separate
areas, called partitions
– Partitions function as independent hard drives
– Referred to as logical drives – Increases efficiency (smaller drives
use smaller clusters)
Partitions used to create:
– A recovery partition
– A new logical drive for data
– A dual boot system
79
Hard Drive Interface Standards:
• Determine how a drive connects to the computer
• Common standards
– Parallel ATA (PATA) - older, slower standard
– Serial ATA (SATA)
– eSATA – SCSI and the newer serial attached SCSI (SAS)
– Fibre Channel
– Fibre Channel over Ethernet (FCoE)
– Internet SCSI (iSCSI)
Magnetic Tape:
A recording medium consisting
of a thin tape with a coating of a
fine magnetic strip, used for
recording digital data. The tape
itself is a strip of plastic coated
with a magnetic recording
medium. Bits are recorded as
magnetic spots on the tape
along several tracks. Usually,
seven or nine bits are recorded
simultaneously to form a
character together with a parity bit. Read /write heads are mounted one in
80
each track so that data can be recorded and read as a sequence of
characters.
Data is stored in frames across the width of the tape. The frames are
grouped into blocks or records which are separated from other blocks by
gaps. Magnetic tape is a serial access medium, similar to an audio
cassette, and so data cannot be randomly located. This characteristic has
prompted its use in the regular backing up of hard disks.
Floppy Disk
The floppy drive uses a thin circular
disk for data storage. It is a soft
magnetic disk. It is a thin magnetic-
coated disk contained in a flexible or
semi-rigid protective jacket. The disk
rotates at 360rpm. A read/write head
makes physical contact with the disk
surface. Data is recorded as a series
of tracks subdivided into sectors. The
floppy disks are usually 3.5" in size.
However, older floppy disks may be in
use; these would be 5.25" in size or
even 8" in size. A 3.5" floppy disk can hold 1.44 MB of data. Once data is
stored on a floppy disk it can be ‘write protected’ by clicking a tab on the
disk. This prevents any new data being stored or any old data being
erased. Disk drives for floppy disks are called floppy drives. Floppy disks
are slower to access than hard disks and have less storage capacity. It is
less expensive and are portable. It can be accessed randomly.
Optical Disk
Optical disks are a storage medium
from which data is read and to
which it is written by lasers. The
optical disk is a random access
storage medium; information can
be easily read from any point on
the disk. CD-ROM stands for
Compact Disk - Read Only
81
Memory. It is now possible to have CD-ROMs where tracks of information
can be written onto them by the user. These are called read/write CD-
ROMs and these are becoming a popular and cheap method for storage.
82
Optical Drives:
– Three categories of discs: CD, DVD, or Blu-Ray Disc (BD)
– Can be read-only, recordable, or rewritable
– Almost always downward compatible – Can support single or dual
Layer discs:
– Recording data onto disc is called burning
– Can be internal or external drives
• External drives typically connect via USB port
Major advantage: large capacity:
– CD discs are normally single layer and hold 650 or 700 MB
– DVD discs hold 4.7 GB (single-layer) or 8.5 GB (dual-layer
– BD discs hold 25 GB (single-layer) or 50 GB (dual-layer
– Discs can also be double-sided
83
Flash Memory Storage Systems
Flash Memory:
– Chip-based storage medium that represents data using electrons
– Used in SSDs and hybrid hard drives
Embedded Flash Memory:
– Flash memory chips embedded into products, such as
• Portable digital media players, digital cameras
• Handheld gaming devices, GPS devices, mobile phones
• Sunglasses and wristwatches
Solid-state drives:
Solid-state drives (SSD) a solid-
state storage device that
uses integrated circuit assemblies
to store data persistently, typically
using flash memory, and
functioning as secondary
storage in the hierarchy of
computer storage. It is also
sometimes called a solid-state
84
device or a solid-state disk. This makes SSDs much faster than magnetic
HDDs. SSDs have no moving parts, make no noise, are more energy
efficient, and produce less heat than HDDs.
85
Cloud storage (online storage): It is accessed via the Internet.
• Via Web sites (Flickr, Facebook, Google Docs, etc.)
• Via online storage sites (Box, Dropbox, etc.)
• Growing in importance because more and more applications are
Web based
• Increasing being used for backup purposes
• Files can be synched between PC and cloud storage
• Many Web sites providing online storage offer it free
• Business cloud storage is available
86
87
Chapter 4
Computer Software
88
Computer software, or simply software, is that part of a computer
system that consists of encoded information or computer instructions, in
contrast to the physical hardware from which the system is built. Computer
software includes computer programs, libraries and related non-
executable data, such as online documentation or digital media. Computer
hardware and software require each other and neither can be realistically
used on its own. The first software of computers in business were in the
early 1950s. At the lowest level, executable code consists of machine
language instructions specific to an individual processor—typically a central
processing unit (CPU). A machine language consists of groups of binary
values signifying processor instructions that change the state of the
computer from its preceding state. For example, an instruction may change
the value stored in a particular storage location in the computer—an effect
that is not directly observable to the user. An instruction may also
(indirectly) cause something to appear on a display of the computer
system—a state change which should be visible to the user. The processor
carries out the instructions in the order they are provided, unless it is
instructed to "jump" to a different instruction, or interrupted.
The majority of software is written in high-level programming
languages that are easier and more efficient for programmers, meaning
closer to a natural language. High-level languages are translated into
machine language using a compiler or an interpreter or a combination of
the two. Software may also be written in a low-level assembly language,
essentially, a vaguely mnemonic representation of a machine language
using a natural language alphabet, which is translated into machine
language using an assembler.
Types of software
The computer is able to do nothing
until it is instructed by software.
Although computer hardware is, by
design, general purpose, software
enables the user to instruct a
computer system to perform specific
functions that provide business
value. There are two major types of
software: systems software and
application software. The
relationship among hardware,
89
systems software, and application software is illustrated in the following
figure.
System Software:
– The operating system and utility programs that control a computer
system and allow you to use your computer
• Enables the boot process, launches applications, transfers files,
controls hardware configuration, manages files on the hard drive, and
protects from unauthorized use
Application Software:
– Programs that allow a user to perform specific tasks on a computer
• Word processing, playing games, browsing the Web, listening to
music, etc.
Systems Software
System software is the software that directly operates the computer
hardware, to provide basic functionality needed by users and other
software, and to provide a platform for running application software.
System Software is an intermediary between computer hardware and
application programs, and may also be directly manipulated by
knowledgeable users. Systems software provides important self-regulatory
functions for computer systems, such as loading itself when the computer
is first turned on, managing hardware resources such as secondary storage
for all applications, and providing commonly used sets of instructions for all
applications to use. System software includes:
- Operating systems
- Device drivers
- Utilities
90
potentially do some work with a computer that only has an operating
system. The following are a list of common operating systems tasks:
1) Interfacing with Users (typically via a GUI)
2) Booting the Computer
– Loads essential part of operating system (kernel) into memory
– Reads opening batch of instructions
– Determines hardware connected to computer
3) Configuring Devices
– Device drivers are often needed; can be reinstalled if needed
– Plug and Play devices are recognized automatically
4) Managing Network Connections
– Manages wired connections to home or office network
– Manages wireless connections at home, school, work, or on
the go
5) Managing and Monitoring Resources and Jobs
– Makes resources available to devices and programs
– Monitors for problems and attempts to correct those that arise
– Schedules jobs
• Jobs to be printed
• Files to be retrieved from hard drive
6) File Management
– Keeps track of stored files on computer so they can be
retrieved when needed
• Files usually viewed in a hierarchical format
7) Security
– Passwords
– Biometric characteristics
– Firewalls
91
Processing Techniques for Increased Efficiency
1) Multitasking:
– The ability of an operating system to have more than one program
(task) open at one time
• CPU rotates between tasks
• Switching is done quickly
• Appears as though all programs executing at the same time
2) Multithreading:
– The ability to rotate between multiple threads so that processing is
completed faster and more efficiently
92
– Thread
• Sequence of instructions within a program that is independent
of other thread
3) Multiprocessing and Parallel Processing:
– Multiple processors (or multiple cores) are used in one computer
system to perform work more efficiently
– Tasks are performed sequentially
4) Memory Management:
– Optimizing the use of main memory (RAM)
– Virtual memory
• Memory-management technique that uses hard drive space
as additional RAM
93
5) Buffering and Spooling
– Buffer
• Area in RAM or on the hard drive designated to hold data that
is used by different hardware devices or programs
– Buffering or Spooling
• Placing items in a buffer so they can be retrieved by the
appropriate device when needed
94
Categories of Operating Systems
95
• Created originally for IBM microcomputers
– MS-DOS
• Created for use with IBM-compatible computers
– Can enter DOS commands in Windows
Windows
– The predominant personal operating system developed by
Microsoft Corporation
– Windows 1.0 through Windows Vista
• Windows 1.0 released in 1985
– Windows 1.0 through Windows 3.x were operating
environments for DOS
• Windows 95, Windows 98, and Windows ME
• Designed for personal computers
• Windows NT (New Technology)
– First 32-bit version of Windows designed for highend
workstations and servers
– Replaced by Windows 2000
• Windows XP
96
– Replaced both Windows 2000 and Windows Me
• Windows Vista
– Replaced Windows XP
– Introduced the Aero interface and Sidebar feature
– Windows 7
• Released in late 2009
• Home Premium (primary version for home users)
• Professional (primary version for businesses)
• Libraries feature gives you virtual folders
– Windows 8
• Designed to be used with smartphones, desktop
computers, with or without a keyboard or mouse
• Supports multi-touch input
• Includes Start screen, tiles, and charms bar
Windows 11
• Current version of Windows. Windows 11 is built on the
same foundation as Windows 10.
– Windows Server
• The version of Windows designed for server use
Mac OS
– Proprietary operating system for computers made by Apple
Corporation
– Based on the UNIX operating system
– Originally set the standard for graphical user interfaces
– Mac OS X Family
• Mac OS X Mountain Lion and Mac OS X Mavericks
– Mac OS X Server • Server version of Mac OS X
97
UNIX
– Operating system developed in the late 1960s for midrange servers
– Multiuser, multitasking operating system
– More expensive, requires high level of technical knowledge; harder
to install, maintain, and upgrade
– “UNIX” initially referred to the original UNIX operating system, now
refers to a group of similar operating systems based on UNIX
– Single UNIX Specification
• A standardized UNIX environment
Linux
– Developed by Linus Torvalds in 1991—
resembles UNIX but was developed
independently
– Is open-source software; has been
collaboratively modified by volunteer
programmers all over the world
– Originally used a command line
interface, most recent versions use a
GUI
– Strong support from mainstream
companies, such as IBM, NVIDIA, HP, Dell, and Novell
– Individuals and organizations are switching to Linux and other open
source software because of cost
Chrome OS
– The first cloud operating system
– Essentially is the Chrome Web browser redesigned to run a
computer, in addition to accessing Web resources
– Replaces traditional desktop operating systems
– Is currently only available preinstalled on Chrome devices
98
Operating Systems for Mobile Devices
– Android
• Linux-based operating
system created with current
mobile device capabilities in
mind
• Can create applications that
take full advantage of all the
features a mobile device has to offer
• Open platform
• Devices support multitasking, multiple cores, NFC mobile
payment transactions, Internet phone calls
– iOS
• Designed for Apple Mobile
phones and mobile devices
• Supports multitasking
• Includes Safari Web browser,
the Siri intelligent assistant,
Facetime video calling, AirDrop
to send items to others, and
apps for email, messaging,
music, and search
Device drivers
99
Utility Program
– Software that performs a specific task, usually related to managing or
maintaining the computer system
– Many utilities are built into operating systems (for finding files, viewing
images, backing up files, etc.)
– Utilities are also available as stand-alone products and as suites
File Management Programs:
• Enable the user to perform file management tasks, such as:
– Looking at the contents of a storage medium
– Copying, moving, and renaming files and folders
– Deleting files and folders
– File management program in Windows 8 is File Explorer
• To copy or move files, use the Home tab to copy (or cut)
and then paste
• To delete files, use the Delete key on the keyboard or
the Home tab
100
Search Tools:
101
Uninstall and Cleanup Utilities:
– Uninstall utilities remove programs from your hard drive without
leaving bits and pieces behind
– Important to properly uninstall programs, not just delete them
– Cleanup utilities delete temporary files
• Files still in Recycle Bin
• Temporary Internet files
• Temporary installation files
102
Backup and Recovery Utilities:
103
– Security programs protect computers and users and it is essential
that all computer users protect themselves and their computers
• Antivirus programs
• Antispyware programs
• Firewalls
• Many are included in Windows and other operating systems
Application software
Application software is the software that
uses the computer system to perform
special functions or provide entertainment
functions beyond the basic operation of
the computer itself. There are many
different types of application software,
because the range of tasks that can be
performed with a modern computer is so
large. General-purpose, off-the-shelf
application programs that support general
types of processing, rather than being
linked to any specific business function,
are referred to as personal application
software. This type of software consists of
nine widely used packages: spreadsheet,
data management, word processing,
desktop publishing, graphics, multimedia, communications, speech-
recognition software, and groupware. Personal application software is
designed to help individual users increase their productivity. Below is a
description of the nine main types.
104
Data management: Data management software supports the storage,
retrieval, and manipulation of related data. There are two basic types of
data management software: simple filing programs patterned after
traditional, manual data-filing techniques, and database management
programs that take advantage of a computer’s extremely fast and accurate
ability to store and retrieve data in primary and secondary storage. File-
based management software is typically very simple to use and is often
very fast, but it offers limited flexibility in how the data can be searched.
Database management software has the opposite strengths and
weaknesses. Microsoft’s Access is an example of popular database
management software.
Graphics: Graphics software allows the user to create, store, and display or
print charts, graphs, maps, and drawings. Graphics software enables users
to absorb more information more quickly and to spot relationships and
trends in data more easily. There are three basic categories of graphics
105
software packages: presentation graphics, analysis graphics, and
computer-aided design software. Presentation graphics software allows
users to create graphically rich presentations. Many packages have
extensive libraries of clip art—pictures that can be electronically “clipped
out” and “pasted” into the finished image. One of the most widely used
presentation graphics programs is Microsoft’s PowerPoint. Analysis
graphics applications additionally provide the ability to convert previously
analyzed data—such as statistical data—into graphic formats like bar
charts, line charts, pie charts, and scatter diagrams. Computer-aided
design (CAD) software, used for designing items for manufacturing, allows
designers to design and “build” production prototypes in software, test
them.
106
difficult to speak with measurable pauses between every word and still
maintain trains of thought.
Software Licensing
Vendors spend a great deal of time and money developing their software
products. To protect this investment, they must protect their software from
being copied and distributed by individuals and other software companies.
A company can copyright its software, which means that the company got a
grant to exclusively reproduce, publish, and sell that software. A license is
permission granted under the law to engage in an activity otherwise
unlawful.
Open Systems
Open systems should not be confused with open source software. Open
source software is software made available in source code form at no cost
to developers. There are many examples of open-source software,
including the GNU (GNU’s Not UNIX) suite of software (gnu.org) developed
by the Free Software Foundation (fsf.org); the Linux operating system;
Apache Web server (apache.org); sendmail SMTP (Send Mail Transport
Protocol) e-mail server (sendmail.org); the Perl programming language
(perl.com), the Netscape Mozilla browser (mozilla.org); and Sun’s
StarOffice applications suite (sun.com). Open source software is, in many
cases, more reliable than commercial software. Because the code is
available to many developers, more bugs are discovered early and quickly,
and are fixed immediately. Support for open source software is also
available from companies that provide products derived from the software,
for example, Red Hat for Linux (redhat.com). These firms provide
education, training, and technical support for the software for a fee.
108
Chapter 5
Computer Networks
109
A large number of computers are interconnected by copper wire, fiber optic
cable, microwave and infrared or through satellite. A system consisting of
connected nodes made to share data, hardware and software is called a
Computer Network. Some Important Reasons for Networking are:
Applications of Network
110
Wired vs. Wireless Networks:
Wired:
• A network in which computers and other devices are physically
connected to the network with cables
• Found in schools, businesses, and government facilities
Wireless
• A network in which computers and other devices are connected to
the network without physical cables
• Data is typically sent via radio waves
• Found in homes, schools, and businesses
Benefits of Network
Types of Network
111
- Local Area Network (LAN)
- Metropolitan Area Network (MAN)
- Wide Area Network (WAN)
Network Topology
112
Ring Network: In a ring network
computers and other communication
devices are connected in a
continuous loop. Electronic data are
passed around the ring in one
direction, with each node serving as
a repeater until it reaches the right
destination. There is no central host
computer or server.
113
Network Architectures
Client-Server Networks:
• Client
– Computer or other device on the network that requests and
utilizes network resources
• Server
– Computer dedicated to processing client requests
114
• Users have direct access to the computers and devices attached to
the network
• Less complicated and less expensive to implement than client-
server networks
• Internet P2P Computing: Content is exchanged over the Internet
directly between users
Basics of Networking
o File Services
o Print services
o Message services
o Application Services
Bandwidth:
– The amount of data that can be transferred in a given period
of time
– Measured in bits per second (bps), Kbps (thousands), Mbps
(millions ), or GFbps (billions)
115
Delivery Method:
– Circuit-Switching
• Dedicated path over a network is established between
sender and receiver; all data follows that path
– Packet-Switching
• Messages are separated into small units called packets
and travel along the network separately; packets are
reassembled once destination is reached
– Broadcasting
• Data is sent out to all other nodes on the network and
retrieved only by the intended recipient; primarily used
with LANs
TCP/IP:
– Most widely used communications protocol
– Consists of two protocols
117
• Transmission Control Protocols (TCP): Responsible for
delivery of data
• Internet Protocols (IP): Provides addresses and routing
information. It uses packet switching to transmit data
– TCP/IP support is built into almost all operating systems and IP
addresses are used to identify computers and devices on networks
Other Protocols:
– HTTP (Hypertext Transfer Protocol) and HTTPS (Secure Hypertext
Transfer Protocol)
• Used to display Web pages
– FTP (File Transfer Protocol)
• Used to transfer files over the Internet
118
– SMTP (Simple Mail Transfer Protocol and POP3 (Post Office
Protocol)
• Used to deliver e-mail over the Internet
Internet
Several networks, small and big all over the world, are connected together
to form a Global network called the Internet. Today’s Internet is a network
of about 50 million or more computers spread across 200 countries.
Anyone connected to the Internet can reach, communicate and access
information from any other computer connected to it. Some of the Internet
users are:
1) Students
2) Faculty members
3) Scientists
4) Executives and Corporate members
5) Government employees
6) Kids
7) Others
The Internet protocol (IP) addressing system is used to keep track of the
million of users. Each computer on net is called a host. The IP addressing
system uses the letter addressing system and number addressing systems.
119
Communication Protocol:
Internet is a packet-switching network. Here is how packet switching works:
A sending computer breaks an electronic message into packets. The
various packets are sent through a communication network-often by
different routes, at different speeds and sandwiched in between packets
from other messages. Once the packets arrive at the destination, the
receiving computer reassembles the packets in proper sequence. The
packet switching is suitable for data transmission. The software that is
responsible for making the Internet function efficiently is TCP/IP.
121
to any one resides in the mailbox till it is opened. Many other features of
standard mail delivery are implemented in email.
FTP: File Transfer Protocol, abbreviated as FTP is used for the net user for
transferring files around the world. The transfer includes software, games,
photos, maps, music and such other relevant materials.
Network Adapter:
– Used to connect a computer to a network
– Also called network interface card (NIC) when in the form of an
expansion card
Modem:
– Device that enables a computer to communicate over analog
networking media
– Term is often used interchangeably with network adapter
122
– Most computers and mobile devices today come with a built-in
network adapter and/or modem
Switch:
– Central device that connects devices in a wired network but only
sends data to the intended recipient
– Hub – similar but sends data to all recipients
Router:
– Connects multiple
networks: two LANs, two
WANS, LAN and the
Internet
– Passes data to intended
recipient only
– Routes traffic over the
Internet
123
Repeaters:
– Amplify signals along a network
Range Extenders:
– Repeaters for a wireless network
Antennas:
– Devices used for receiving or sending radio signals
– Some network adapters can use an external antenna
– Can be directional or omnidirectional
– Strength measured in decibels (dB)
Multiplexer:
– Combines transmissions from several different devices to send
them as one message
Concentrator:
– Combines messages and sends them via a single transmission
medium in such a way that all of the messages are simultaneously
124
active
- PC or wireless device
- Router
- Modem
- ISP
- Internet
125
While the router and modem are usually separate entities, in some cases,
the modem and router may be combined into a single device. This type of
hybrid device is sometimes offered by ISPs to simplify the setup process.
126
Chapter 6
Computer Security
127
The security of a system, application, or protocol is always relative to:
For example, standard file access permissions in Linux and Windows are
not effective against an adversary who can boot from a CD.
128
Confidentiality
129
computer’s serial number, or by a role that a person has, such as being a
manager or a computer security specialist.
130
and doors, the placement of computers in windowless rooms, the use of
sound dampening materials, and even the construction of buildings or
rooms with walls incorporating copper meshes (called Faraday cages) so
that electromagnetic signals cannot enter or exit the enclosure.
Integrity
Tools:
Data correcting codes: methods for storing data in such a way that small
changes can be easily detected and automatically corrected.
Availability
131
Computational redundancies: computers and storage devices that serve
as fallbacks in the case of failures.
Assurance
132
music store may provide permissions for limited access and copying
to people who have purchased certain songs.
– Protections, which describe mechanisms put in place to enforce
permissions and polices. We could imagine that an online music store
would build in protections to prevent people from unauthorized
access and copying of its songs.
Authenticity
Anonymity
Tools:
133
Proxies: trusted agents that are willing to engage in actions for an
individual in a way that cannot be traced back to that person.
134
Denial-of-service: the interruption or degradation of a data service or
information access. For example: email spam, to the degree that it is meant
to simply fill up a mail queue and slow down an email server.
135
requires the different parties to provide receipts acknowledging that data
has been received.
Encryption
136
Passwords
- steal personal information: the thief can read the user’s emails and
personal information.
- steal privacy protected data: the thief can gain access to data about
other people protected by privacy, or read emails received from other
people. The legal responsible of this privacy violation is the thief as
well as the user who did not protect other people’s data.
- steal money: the thief can find the user’s bank account numbers and
passwords, sometimes directly from the user’s web browser’s history.
- delete and modify data: the thief can delete user’s important data, or
even worse he can modify these data without the user’s knowledge
(bank numbers, friend’s email addresses, degree thesis content, add
illegal pictures).
- steal identity: for the computer the thief is now the user, and therefore
he can act to the outside world exactly as if it were the user, for
example answering to emails, subscribing to websites, withdrawing
from exams.
137
- start illegal activities: anybody who wants to start an illegal Internet
activity will obviously use somebody else identity, so he will not get
into troubles when the activity is discovered.
There exist automatic programs which are able to try 4 billion passwords
each second, and they usually start trying combinations of words and
numbers (the complete set of all Italian, German and English words can be
tried in less than 1 second). Check on https://howsecureismypassword.net
how much time does it take to one of these programs to discover your easy
passwords.
138
password system. It can be fingerprint recognition, hand palm blood
vessels recognition, eye’s retina scanning or voice identification.
Viruses
While normal external attacks do not involve normal users, the virus is a
special attack which arrives directly on the user’s computer and must be
prevented and stopped by him. The virus is a little program which has this
name because its life cycle is the same of a biological organism: survive
and duplicate.
139
Many names are used for viruses’ types according to their different
behaviors:
- trojan horse is a virus which looks like a good program and, when
downloaded and run by the user, it performs the user’s wanted task
but at the same time does other actions;
- key logger is a virus which records keyboard’s activity and then sends
the keystrokes to its creator, mostly to get user’s passwords;
- back door is a virus which opens a port on the computer to let
external users in;
- adware is a virus which displays advertisement;
- spyware is a virus which spies user’s activity to get passwords or to
target the user with specific advertisement;
These types are not exclusive: for example a Trojan horse which is at the
same time a spyware and an adware. An infected computer can be
recognized by some symptoms. These are the most frequent ones:
Most of the time, a responsible user’s behavior it the best weapon against
viruses: it protects him from getting viruses, helps him removing them and
prevents him from diffusing them. Responsible behavior means:
140
- never open downloaded files and email attachments, especially when
they come from a friend with a text such as “please open it, urgent!”,
since simulating to be a user’s friend is a typical virus tactics. To open
these files, save them on the desktop, check them with an antivirus
and then open them;
- do not insert in your computer CDs, DVDs and USB pendrives
coming from other people or which were inserted in other computers,
unless you have an antivirus running or unless you scan them
immediately with an antivirus;
- avoid visiting strange websites, especially pornographic or hackers’
website, or websites which open a lot of pop-up windows;
- have an antivirus always running or at least run an updated antivirus
on your whole hard disks every week (while Italian law currently
prescribes minimum every 6 months); keep your antivirus always up
to date: more than 50 new viruses appear every week;
- keep communication programs and Microsoft products up to date.
Microsoft and most software companies offer free updates and
automatic updating tools;
- beware of free programs which often try to install adware programs,
asking the permission very quickly during installation’s steps, relying
on the novice user’s habit of clicking always “yes”.
To check the computer for viruses and to try to remove viruses from the
computer, the user can run a special program called antivirus. The antivirus
basically has three possible different actions:
- it can scan all the storage devices (hard disks, the floppy disk inside
the computer, the CD or DVD inside the reader) for viruses. If a virus
is found, it tries to remove it and to repair damaged files. Some files
can be unrecoverable. Complete devices scanning takes usually
some hours;
- it can scan a single file or an entire directory for viruses. If there is an
infected file, it tries to delete the virus and repair it. Some files can be
unrecoverable. Single file scanning takes some seconds;
- it can be always running. In this case, whenever a virus or a suspect
file is run, the antivirus prevents it from running and warns the user.
A lot of antivirus programs, free and commercial, exist. Their most
important feature is obviously the possibility to be constantly updated
through the Internet. Some common antivirus programs are:
- AVG
141
- Kaspersky
- Norton
- Avira
- Avast
- Clamwin
- Panda Cloud
Emails: For viruses, email attachments are a first class way of traveling,
since they are very often opened by users without any precaution.
Sometimes viruses hide inside files which were really sent by the sender,
unaware of having an infected computer. Other times a virus takes control
of the mail reader program and sends itself to the whole address book,
counterfeiting the sender address (often using an address taken from the
address book) in order to avoid that the real infected computer be identified
and to gain the thrust of the receiver, and writing in the email text smart
sentences pretending to be a regular friend of the receiver. The arrival of
this kind of email usually creates havoc, since the receiver is sure that the
fake sender has a virus, while the original infected computer is another
one.
The basic rule is never open any attachment from the mail reader program.
Save the attached files on the desktop and run an antivirus program to
check these files before opening them. Even when the email comes from a
friend: he cannot know that to have got a virus, or he can not be the real
sender.
Spam: Spam messages are unsolicited unwanted bulk emails. They are
unsolicited, meaning that the user did not ask to receive them, they are
unwanted, meaning that the user did not want to receive them, and they
are bulk, meaning that they are sent to millions of addresses. They are
used mainly for four different purposes:
- advertisement emails are the most innocuous version. The email
message contains commercial information usually on medicines,
pornography, software or investments. Sometimes these messages
are purposely written with orthographic mistakes or with strange
characters, to avoid being intercepted by anti-spam programs;
- chain letters are electronic versions of letters circulating in the XX
century. They promise good luck to anyone resending it and bad luck
to anyone trashing it, or they contain a sad story of an ill child desiring
142
postcards or an urgent warning about a terrible virus: their content is
probably false or too old, and a search on the WWW will reveal this
immediately. Sending it around will probably cause complains from
other users;
- frauds are usually long letters proposing the user a semi-legal
bargain or a big lottery prize. Their only aims are to get the user’s
bank coordinates for further illicit activities and to lure him into paying
small expenses hoping to get the promised imaginary money;
144
connections and determine rules to approve or deny automatically
connections.
Backup
Backup is the process of copying important data to another location to
prevent their loss. Sometimes programs and even entire operating systems
are copied, to be able to immediately continue working even when a
computer breaks. There are three very good reasons to do regular
backups:
- against the user, who can accidentally delete some files or who can
modify files and then change his mind. Having a recent backup handy
can often save hours of work;
- against the system, which can suddenly break due to hardware or
software problems. Even hard disks tend to be unreliable after some
years of continuous activity. A recent backup saves the user from
redoing all the work of the previous months;
- against viruses and other users, which can delete and alter files: a
backup can save a user coming back from vacations.
Usually the operating system’s and the programs’ backup are done by
system administrators. However, there are some files which should be
taken in charge by the user himself:
- personally created data files, including all documents and images
created by the user, and any other file which is a result of the user’s
personal work;
- in case emails are not handled with an online system: the contacts,
calendar and the emails (mail readers usually offer a way to save
them into files to be used for backup);
- some programs require a lot of configuration and store their
configuration in configuration files, which are usually in the program’s
directory;
- all the stuff which is difficult to find again, such as documents from
other people or downloaded from forgotten websites.
The place where the files are copied determines the reliability of the
backup. It should be a large, cheap and fast storage device. It should also
be handy, since the typical problem with backup is that the user does not
takes time to do it regularly and, when the backup is too old, it is worthless.
For home or simple office users, the Friday morning backup is a good
145
timing solution. A good storage device to be used is a second hard disk,
used only for backup, which is very fast and very large and always ready to
be used.
146