Ilovepdf Merged

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 295

Computer Skills For

Preparatory Programs

CS 041

Computer Skills Department


Al-Imam university

1
Chapter 1
Why Computers Matter to You:
Becoming Computer Literate

Note:
Chapter 1 introduces the basics of becoming
computer literate, including many concepts
that will be developed throughout the course.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 2


Chapter Topics
• Computer literacy
• Computers and careers
• Technology challenges

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 3


Chapter Objectives
After reading this chapter, you should be able to answer the
following questions:
1. What does it mean to be “computer literate”?

2. How does being computer literate make you a savvy computer user
and consumer?

3. How can becoming computer literate help you in a career?

4. How can becoming computer literate help you understand and take
advantage of newly emerging careers?

5. How does becoming computer literate help you deal with the
challenges associated with technology?

4
What is Computer Fluency?
What is Computer Literacy?
• To be computer fluent you must:
– Understand a computer’s capabilities and
limitations
– Know how to use a computer
Why Become Computer Literate?
• Benefits of learning about computers include:
– Being a knowledgeable consumer
– Using current and future technology
– Increasing your career options
– Understanding ethical and legal implications
– Note:
– The information age is upon us, and every corner of our lives has
been affected. Everything we do—our work, our play, the way we
communicate and carry on commerce, and our relationships—has
been affected by computers. By becoming computer literate you
will be familiar enough with computers to understand their
capabilities and limitations and to know how to use them.
Becoming computer literate is what this course is all about.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 6


Be a Savvy Computer User
and Consumer
• Avoid hackers and viruses
• Protect your privacy
• Understand the real privacy and security risks
• Use the Internet wisely
• Note:
• Now that the personal computer is such a large part of our lives,
knowing how to analyze, choose, purchase, and maintain your own
computer system is a required skill for success in the academic and
business worlds.
• Being a savvy consumer will help you accomplish all the goals on this
and the following slide. It will save you money, make you more
productive, help you protect your identity, and ensure that you have a
working system when you need it. As technology evolves, you will also
be able to keep up and adapt.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 7


Be a Savvy Computer User
and Consumer
• Avoid online annoyances
• Maintain your computer
• Make good purchase decisions
• Integrate the latest technology

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 8


Computers in the Workplace
• Information technology (IT) involves:
– Information handling
– Information retrieval
– Computers
– Telecommunications
– Software deployment
• The seven fastest-growing occupations are computer related.
• Note:
• Computers are used in most occupations, and one career that often
comes to mind is information technology. IT is the set of techniques
used in handling and retrieving of information automatically. IT includes
computers, telecommunications, and software deployment.
• IT jobs are on the rise, and the seven fastest-growing occupations are
computer related.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 9


Computers in Your Career?
• Computers are used in:
– Business –Law enforcement
– Retail –Agriculture
– Delivery –Automotive technology
– Arts –Medicine
– Computer gaming –Sciences
– Education –Military

Note:
Regardless of which profession you pursue, computers are most likely in use in that
setting.
Becoming computer literate will help you perform your job more effectively and make
you a more desirable employee.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 10


Computers in
Business, Retail, and Delivery
• Data mining
• Package tracking

Note:
Business around the world is conducted on computers. Information is stored
in enormous databases. To make meaning of all that data, businesses use a
process known as data mining to spot trends.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 11


Computers in the Arts

• Create Web sites


• Digitize dance movements
• Produce computer-
generated art
Note:
The creative arts have also been enhanced by
computers. Artists communicate and collaborate
across oceans. Writers and editors complete their
work together from across the country. New forms
of graphic arts and cinematography are introduced
every day—globally and immediately. Even dance
has been enhanced with the computer.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 12


Computers in Gaming
• Get a job doing:
– Design
– Programming
– 3D animation

Note:
The computer and video game industry is enormous. In fact, intricate (money
outlets) from computer gaming in the United States have surpassed outlets
from Hollywood. Very complex programming lies behind these games. The
animations are the result of years of research and development, and new
games are developed every day.
Because computer games are best developed for a local market by people
native to that market, game development will most likely stay in the United
States instead of being offshored (far away), as many programming jobs have
been.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 13
Computers in Education
• Instructional software
• Distance education
• Computerized research
• The Internet
• PDA-guided tours
Note:
Computers have given teachers tremendous new tools for presenting information
and keeping records.
Colleges offer full degree programs totally online.
Vast stores of information are available wherever there is an Internet connection.
Libraries have brought the computer into their operations. Training tutorials are
used to teach new tasks, and research is done from the pc desktop. Education
will never be the same.
Museums are incorporating tools such as personal digital assistants (PDAs) to
enhance tours by offering extended learning experiences about their displays

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 14


Computers in Law Enforcement
• Search databases
• Predict criminal activity
• Employ computer forensics
• Note:
• Law enforcement uses computers to quickly find records, locate possible
suspects, and investigate accounts.
• Criminologists can use specialized software to forecast criminal activity.
• Computer forensics is the application of computer systems and techniques
to gather potential legal evidence. Computer programs like the Forensic
Tool Kit (FTK) can catalog and index a hard drive and help investigators
recover deleted or damaged files from computers used in the commission of
a crime.
• Software programs are even available to train law enforcement officers to
recognize when a suspect is lying.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 15


Computers in military
• Soldiers are trained computer specialists in areas such
as:
• 1-sattellite transmissions.
• 2-radio controller .
• 3-computer networking.
• Whether the job is in electronic aviation support or
logistic or supply…
• Note:
• Unmanned drones can be controlled remotely, even at
distance of thousands of miles, by modern electronic
systems.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 16


Computers in Agriculture
• Programs manage complex farming business and information
systems
• RFID tags track and record animals in case of diseases
• Computerized sensors monitor conditions and activate equipment to
protect crops
• Note:
• Farm management programs assist in managing complex business
and information systems.
• Radio frequency identification (RFID) tags are placed on the ears of
livestock so that animals can be tracked and a record can be kept in
case of disease outbreaks.
• Computerized sensors monitor conditions and activate equipment to
protect crops like cranberries.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 17


Computers in
Automotive Technology
• Environmental trends and
government regulations
• Computerized sensors and CPU
systems in vehicles
• Consumer demand for
computerized subsystems

Environmental trends and government regulations influence the use of


technology in vehicles.
Automotive technicians diagnose and research problems with
computerized sensors and CPU systems in vehicles using computers,
databases, and the Internet.
Consumer demand for computer subsystems like GPS navigation, digital
music systems, and voice-controlled phones continues to grow.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 18
Computers in Medicine
• Patient simulators and surgical robots
• Digital modeling of human anatomy

Note:
The ability of the computer to store, process, and distribute vast amounts
of information globally and immediately has led to tremendous
breakthroughs in pharmaceuticals and disease prevention. People are
living longer, healthier lives, and computers have played a large part in this
development.
Medical professionals can now train on patient simulators without risking a
patient’s life.
Surgery is being performed with robotic equipment.
In the Physiome Project, bioengineers are creating realistic computer
simulations of all human biological systems.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 19
Biomedical Implants
• Technological
solutions to
physical problems
• Identity chips
Note:
Retinal implants are replacing damaged nerves and providing sight
to the blind.
Biomedical implants can also monitor systems inside the body for
problems and catch them before they get out of control.
Identity chips are being embedded in humans and can be scanned
to prove a person’s identity

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 20


Computers in the Sciences
• Supercomputers create simulations in
– Astronomy
– Meteorology
– Archaeology

Note:
Science has used the computer to streamline studies, eliminate
redundancy(copied things), test hypotheses, develop theories, and communicate
findings(results). The computer has enabled vast new levels of global
collaboration, advancing fields like engineering, chemistry, physics, and
cosmology to unprecedented(unexpected) levels.
Supercomputers crunch(process) enormous amounts of data, creating simulations
that model planets and their orbits, for instance.
Thanks to detailed simulations, tornado forecasting may be getting more
accurate.
3D modeling and imaging software is helping archeologists simulate ancient
civilizations.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 21
Computers in Sports
• Improved training
• Timing
• Data storage and statistics
• Smart balls sense when soccer goals are
scored

Note:
Computers are now being used to help athletes analyze their performance and improve
their game.
Coaches in football use computers constantly. Officials use them to control games. The
use of computers at the Olympic Games is legendary.
In soccer, Smartballs are used to sense automatically when balls cross the goal
line.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 22


Digital Home
• You can control home systems from your computer and via the
Internet:
– Entertainment
– Security
– Lights
– Heating and
cooling
– Appliances
– Note:
– Devices can be added to your computer to control digital systems and
equipment in the home. In the future, with the integration of new and
emerging technologies, a digital home setup will be able to tell when
you are out of milk in the refrigerator, order it from the grocery store,
and schedule its delivery based on your online calendar.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 23


Digital Home: Components
• Media computer with:
– TV tuner
– Radio tuner
– Media software
– Blu-ray, DVD, and/or CD
– Network adapter
– Note:
– A basic set of digital home components would include a media computer
with a TV tuner; a radio tuner; media software; a Blu-ray, DVD, and/or CD
player and/or recorder; and a network adapter.
– It would also require access to a network, a digital television, a digital
media adapter, and a universal remote. Such a system would allow you
to show videos or play music from your computer on a television in any
room of your house.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 24


Nanotechnology
• Nano: Prefix stands for one-billionth
• Nanoscience: Study of molecules and nanostructures
• Nanostructures: Range in size from 1 to 100 nanometers
• Nanotechnology: Science of the use of nanostructures
• Note:
• A nanometer is one-billionth of a meter.
• Nanoscience involves the study of molecules(jozayaat) and structures
(called nanostructures) that range from 1 to 100 nanometers.
• Nanotechnology is the science involving the use of nanostructures to build
devices on an extremely small scale. The devices are called nanoscale
machines and represent the smallest human-made structures that can be
built.
• Working at the molecular level, scientists are building microscopic machines
that perform assigned tasks. New materials and processes are emerging in
this exciting new field of discovery.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 25


Challenges Facing a
Digital Society
• Privacy risks
• Personal data collection
• E-mail monitoring
• Copyright infringement (breacking)
• Reliance(trust) on computers for security
• Digital divide
• Note:
• The information age brings to each of us a set of unprecedented challenges.
Our identity can be stolen. Our work e-mails can be viewed. Otherwise law-
abiding citizens illegally copy software. Without thinking, we cut and paste
from copyrighted material on the Web.
• As computers become more and more embedded in our lives, all of these
challenges will grow. Using their knowledge and awareness, users must make
the personal decisions required to efficiently, legally, and safely maneuver
through cyberspace.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 26
Chapter Summary
1. What does it mean to be “computer literate”?

2. How does being computer literate make you a savvy


computer user and consumer?

3. How can becoming computer literate help you in a


career?

4. How can becoming computer literate help you understand


and take advantage of newly emerging careers?

5. How does becoming computer literate help you deal with


the challenges associated with technology?
27
The End
Next :
Chapter 2: Looking at Computers: Understanding the
Parts

Imam university 28
Computer Skills For
Preparatory Programs

CS 041
Chapter 2
Looking at Computers:
Understanding the Parts
* Chapter 2 takes a look at the
different parts of a computer.
Imam - University 1
Chapter Objectives
After reading this chapter, you should be able to answer the following
questions:
• What exactly is a computer, and what are its four main functions?
• What is the difference between data and information?
• What are bits and bytes, and how are they measured?
• What devices do I use to get data into the computer?
• What devices do I use to get information out of the computer?
• What’s on the motherboard?
• Where are information and programs stored?
• How are devices connected to the computer?
• How do I set up my computer to avoid strain and injury?

Imam - University 2
Chapter Topics
• Functions of a computer
• Data versus information
• Bits and bytes
• Input devices
• Output devices
• Processing
** Chapter topics include:
• Storage
•Functions of a computer
• Ergonomics •The difference between data
and information
•The definition of bits and bytes
•Input devices
•Output devices
•System unit
•Ergonomics 3
Computers Are Data
Processing Devices
• A computer’s four
major functions:
•Strictly defined, a computer is a data
– Gathers data processing device that performs four major
(users input functions:
data) 1. It gathers data (or allows users to input
– Processes data data).
into information
2. It processes that data into information.
– Outputs data or
information 3. It outputs data or information.
– Stores data and
information 4. It stores data and information.
4
Data vs. Information
• Data: Representation of a fact, figure, or idea
• Information: Organized, meaningful data

•Data is a representation of a fact, figure, or idea. Data can be


a number, a word, a picture, or even a recording of sound. For
example, the number 6125553297 and the names Derek and
Washington are pieces of data.
•Information is data that has been organized or presented in
a meaningful fashion. When your computer provides you
with a contact listing that indicates Derek Washington can be
reached by phone at (612) 555-3297, the data mentioned
earlier suddenly becomes useful—that is, it becomes
information. 5
Bits and Bytes:
The Language of Computers
• Bit
– Binary digit
– 0 or 1
• Byte
– 8 bits
• Each letter, number, and character = a string of eight
0s and 1s
•In order to process data into information, computers need to work in a language they
understand. This language, called binary language, consists of just two digits: 0 and 1.
•Everything a computer does is broken down into a series of 0s and 1s. Each 0 and 1
is a binary digit, or bit for short.
•Eight binary digits (or bits) combine to create 1 byte.
•In computers, each letter of the alphabet, each number, and each special character
(such as the @ sign) consists of a unique combination of 8 bits, or a string of eight 0s
and 1s.
•As it turns out, if 8 bits are put together, there are 256 possible combinations. That
number of combinations allows for a code that can include all the uppercase and
lowercase letters of the alphabet, all 10 digits, punctuation marks, and many other
much-used symbols. We call these 8 bits working together a byte. Bytes are the basic
measurement for storage in a computer. 6
How Much Is a Byte?

•Not only are bits and bytes used as the language that tells the computer what to do
•, they are also what the computer uses to represent the data and information it inputs
• and outputs.
•Kilobytes, megabytes, and gigabytes are therefore simply amounts of bytes. 7
Computer Software
• Software: Programs that enable hardware to
perform different tasks
– Application software
– System software
•Software is the set of computer programs that enables the hardware to
perform different tasks.
•There are two broad categories of software: application software and
system software.
•Application software is the set of programs you use on a computer to
help you carry out tasks. If you’ve ever typed a document, created a
spreadsheet, or edited a digital photo, for example, you’ve used a form
of application software.
•System software is the set of programs that enables your computer’s
hardware devices and application software to work together. The most
common type of system software is the operating system (OS). It
manages the computer system’s hardware—such as the monitor and the
printer. The operating system also provides a means by which users can
interact with the computer.
8
Computer Hardware
Hardware: Any part of the computer you can touch

•Hardware components consist of the system unit and


peripheral devices, such as monitors and printers that are
connected to the computer.
•Other hardware devices, such as routers, help a computer
communicate with other computers to facilitate sharing
documents and other resources.
•Together, the system unit and peripheral devices perform
four main functions: they enable the computer to input
data, process that data, and output and store the data and
information.

9
Each part of the computer
serves a special function.

Imam - University 10
Types of Computers
• Notebook: Portable computer
• Desktop: Used at a single location
• Mainframe: Supports hundreds of users simultaneously
• Supercomputer: Performs complex calculations rapidly
• Embedded: Self-contained computer performing dedicated
functions
•The two basic designs of computers are notebooks (or laptops), which are portable and
powered by batteries or an electrical outlet, and desktops, which are not as easily
moved from location to location. These are also known as personal computers (PCs).
•Notebook computer components such as the keyboard and monitor are integrated into
a single computer case and desktop computers have a case that houses the system
unit and peripheral devices, such as monitors and printers that are connected to the
computer. The Apple iMac packs its components into an all-in-one design.
•Mainframe computers can execute many different computer programs at the same time
and are often used in insurance companies and colleges and universities.
•Supercomputers are used to perform intensive mathematical calculations such as
weather forecasting.
•Embedded computers are computer chips that reside inside other devices such as your
car, thermostat, or microwave.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 11


Input Devices
• Devices used to enter information or instructions into the computer
– Keyboard
– Mouse/
pointing device
– Stylus
– Scanner
– Digital camera
– Microphone
•An input device enables you to enter data (text, images, and sounds)
and instructions (user responses and commands) into the computer.
•The most common input devices are the keyboard and the mouse.
•You use keyboards to enter typed data and commands, whereas you
use the mouse to enter user responses and commands by clicking on an
icon.
•There are other input devices as well: microphones input sounds;
scanners and digital cameras input nondigital text and digital images.
•Styluses (devices that look like skinny pens but have no ink) and
electronic pens are also becoming quite popular and are often used in
conjunction with graphics tablets that can translate a user’s handwriting
into digital input.
Imam - University 12
Keyboards
• The QWERTY layout is
standard on most PCs.
• Enhanced keyboard
features include number,
function, and navigation
keys.
•The QWERTY layout gets its name from
the first six letters in the top-left row of
alphabetic keys on the keyboard.
•The QWERTY layout was originally
designed for typewriters, not computers,
and was meant to slow typists to prevent
typewriter keys from jamming. The
QWERTY layout is therefore considered
inefficient because it slows typing speeds.
•Enhanced keyboard features include
number, function, and navigation keys.
Imam - University 13
Specialty Keyboards
• Notebook keyboard
• PDA stylus
• Tablet PCs
• Wireless keyboard
•notebook keyboards are more compact
than standard keyboards and therefore
have fewer keys. Still, a lot of the notebook
keys have alternate functions so that you
can get the same capabilities from the
limited keys as you do from the special
keys on standard keyboards.
•Generally, you enter data and commands
into a PDA using a stylus, a pen-shaped
device that you use by tapping or writing
on the PDA’s touch-sensitive screen.
Imam - University 14
• Optical mouse Mice
– Needs no mouse pad
– Doesn’t need cleaning
– Is more expensive
• Trackball
– Easier on wrists
– Stays stationary on desk
• Wireless
– Uses radio or light waves
•The optical mouse uses an internal sensor or laser to detect the
mouse’s movement. Optical mice have no moving parts on the
bottom, so there is no way for dirt to interfere with the mechanisms
and less chance of parts breaking down.
•A trackball mouse remains stationary and doesn’t demand much
wrist motion, so it’s considered healthier on the wrists.
•Wireless mice send data to the computer by radio or light waves.
Imam - University 15
Other Input Devices
• Scanners
– Text
– Images
• Digital cameras Flatbed
– Images scanner
– Video Handheld scanner

Digital camera
•Other input devices include scanners and cameras.
•Scanners copy images from existing sources, digitize
them, and make them available for editing or processing
in the computer as well as viewing on the screen. Camcorder
•Digital cameras make a digital file of an image for editing,
printing, or distribution on the Web. Digital movies can be
created with a digital video camera and can be edited and
distributed electronically.
Imam - University 16
Other Input Devices
• EPOS Digital Pen
• Webcam
– Live video

•The EPOS Digital Pen works in conjunction with


• a flash drive. You can write with
• the pen on any conventional paper, and your writing is
captured and then wirelessly transmitted and stored in the
flash drive. When the flash drive is connected to a computer,
you can use software to translate your writing into digital text.
•Webcams are small cameras that usually sit on top of your
computer monitor or are built into your notebook computer.
Although some webcams are able to capture still images,
webcams generally are used to transfer live video directly to
your computer.
Imam - University 17
Inputting Sound
• Microphones are used
for:
– broadcasts
– Video-conferencing
– Internet phone calls
– Speech recognition
•A microphone allows you to capture sound waves and transfer them in digital format
to your computer.
•Microphones come with most computers. If you didn’t get a microphone with yours, you
may want to buy a desktop microphone if you plan to record your own audio files.
•Microphones come in two basic types. Unidirectional microphones pick up sound from
only one direction. Omnidirectional microphones pick up sounds from all directions at
once.
•A headset microphone is best for videoconferencing and speech-recognition uses.
Videoconferencing technology allows a person sitting at a computer equipped with a
personal video camera and a microphone to transmit video and audio across the Internet
(or other communications medium).
•In speech-recognition systems, you operate your computer through a microphone, telling it
to perform specific commands or to translate your spoken words into data input. Windows
Vista now includes speech recognition as part of the basic operating system.
Imam - University 18
Input Devices for the
Physically Challenged
• Visual impairments
– Voice recognition
– Keyboards with large keys
– On-screen keyboards
• Motor control issues
– Special trackballs
– Head-mounted devices
•Visually impaired users can input data from voice
recognition or by using large keyboards, including touch-
screen keyboards.
•Users with severe motor control problems can use special
trackballs designed for one-finger use that can be mounted
anywhere.
•When arm motion is severely restrained, head-mounted
pointing devices can be used.
Imam - University 19
Output Devices
• Send processed data out of the computer
– Monitors
– Printers
• Output devices make:
– Soft copies (video, sounds, control signals)
– Hard copies (print)

•Output devices enable you to send processed data out of your


computer. This can take the form of text, pictures (graphics),
sounds (audio), and video.
•One common output device is a monitor, which displays text,
graphics, and video as soft copies (copies you can see only on-
screen).
•Another common output device is a printer, which creates
tangible or hard copies of text and graphics.
•Speakers are output devices for sound.

Imam - University 20
Monitor Types
• CRT (Cathode-Ray • LCD (Liquid Crystal
Tube) Display)
– Less expensive – More expensive
– Uses much more space – Uses far less space
– Uses more energy – More energy efficient
– Offers better viewing – Less viewable from an angle
angles
– Legacy technology

•There are two basic types of monitors: CRTs and LCDs.


•If your monitor looks like a traditional TV set, it has a
picture tube device called a cathode-ray tube (CRT).
•If your monitor is flat, such as those found in laptops, it is
using liquid crystal display (LCD) technology.
•CRT monitors are fast becoming legacy technology--
computing devices that use techniques, parts, and
methods that are no longer popular
Imam - University 21
LCD Monitor Features
• Screens are grids made up of millions of pixels
• Each pixel is composed of red, blue, and green
subpixels
• Liquid crystal is sandwiched between two
transparent layers to form images
•Monitor screens are grids made up of millions of pixels, or tiny
dots.
•Illuminated pixels create images on the monitor. There are three
subpixel colors: red, blue, and green.
•LCD monitors are made of two (or more) sheets of material filled
with a liquid crystal solution. A fluorescent panel at the back of the
LCD monitor generates light waves. When electric current passes
through the liquid crystal solution, the crystals move around, either
blocking the fluorescent light or letting the light shine through. This
blocking or passing of light by the crystals causes images to be
formed on the screen.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 22
LCD Quality Factors
• Resolution
• Viewing angle
• Contrast ratio
• Brightness
• Response time
•The most important factor to consider when choosing an LCD
monitor is resolution. The higher the resolution, the sharper and
clearer the image will be.
•Viewing angle: How far you can move to the side of (or above or
below) the monitor before the image quality degrades to
unacceptable levels.
•Contrast ratio: A measure of the difference in light intensity between
the brightest white and the darkest black that the monitor can
produce.
•Brightness: A measure of the greatest amount of light showing when
the monitor is displaying pure white.
•Response time: The time it takes for a pixel to change color. The
lower the response time, the clearer moving images will appear.
Imam - University 23
Other Video Output
• Touch-screen monitors
– Double as both input and output devices
• Projectors
– Project a computer image to a large screen for sharing with large
groups

•Touch-screen monitors act as input and output devices


rolled into one. They are becoming more common on
home computers. People with limited motor control
are often greatly assisted by touch-screen monitors.
•Data projectors, like the inexpensive one shown on
the slide, project a computer image to a large screen
for sharing with large groups. Commonly used in
education and business, they are becoming less
expensive and more portable, making them an
attractive option in the digital home.

Imam - University 24
• Impact printers Printers
– Dot-matrix
• Nonimpact printers
– Inkjet
– Laser
• Specialty printers
– Multifunction(all in one)
– Plotters
– Thermal printers
•There are two primary categories of printers: impact and nonimpact.
•Impact printers have tiny hammer-like keys that strike the paper through an inked
ribbon, making a mark on the paper. The most common impact printer is the dot-
matrix printer.
•Dot-matrix printers are a legacy technology.
•In contrast, nonimpact printers spray ink or use laser beams to transfer marks onto
the paper. The most common nonimpact printers are inkjet printers and laser
printers.
•There are also a number of specialty printers on the market, including multifunction
(also known as all-in-one) printers, plotters, and thermal printers.
Imam - University 25
Nonimpact Printers
• Inkjet
– Less expensive device
• Laser
– Print high-quality color
– More expensive device
images cost effectively
– Faster printing speed
– Less expensive per page
in B&W
– Color lasers are
becoming less expensive
•Inkjet printers work by spraying tiny drops of ink onto paper. When using the
right paper, higher-end inkjet printers print images that look like professional-
quality photos. Because of their high quality and low price, inkjet printers are the
most popular printers for color printing.
•Laser printers are often preferred for their quick and quiet production and high-
quality printouts. Although more expensive to buy than inkjet printers, over the
long run, for high-volume printing, laser printers are more economical than
inkjets (they cost less per printed black-and-white page) when you include the
price of ink and special paper in the overall cost.
26
Imam - University
• Speed (ppm)
Choosing a Printer
• Resolution (dpi)
• Color output
• Memory
• Use and cost
• Cost of consumables
•Speed: A printer’s speed determines how many pages it can print per minute (called pages per minute,
or ppm). Printing speeds range from 8 to 38 ppm for both laser and inkjet printers.
•Resolution: A printer’s resolution (or printed image clarity) is measured in dots per inch (dpi). The
higher the dpi, the greater the level of detail and quality of the image. For general-purpose printing, 300
dpi is sufficient; for printing photos, 1,200 dpi is better.
•Color output: Some printers come with a single ink cartridge for all colors; others have two ink
cartridges, one for black and one for color. The best setup is to have individual ink cartridges for each
color, so you can replace only the specific color cartridge that is empty.
•Memory: Printers need memory in order to print. Inkjet printers run slowly if they don’t have enough
memory. If you plan to print small text-only documents on an inkjet printer, 1 to 2 megabytes (MB) of
memory should be enough. Graphics-heavy files require 8 megabytes (MB) of memory, and laser
printers should have at least 16 megabytes (MB) of memory.
•Use and cost: If you will be printing mostly black-and-white, text-based documents or will be sharing
your printer with others, a black-and-white laser printer is best because of its printing speed and overall
economies for volume printing. If you’re planning to print color photos and graphics, an inkjet printer or
color laser printer is a must, even though the cost per page will be higher.
•Cost of consumables: You should investigate carefully the cost of consumables (printer cartridges and
paper) for any printer you are considering purchasing.
Imam - University 27
Outputting Sound
• Speakers and headphones

•Most computers include inexpensive speakers as an output


device for sound. These speakers are sufficient to play the
standard audio clips you find on the Web and usually enable
you to participate in teleconferencing.
•If you plan to digitally edit audio files or are particular about how
your music sounds, you may want to upgrade to a more
sophisticated speaker system, such as one that includes
subwoofers and surround-sound.
•Headphones are recommended for notebooks when they are
used in proximity to others.
Imam - University 28
The System Unit
• Box that contains the central electronic components of the
computer:
– CPU/RAM/
motherboard
– Expansion cards
– Power supply
– Storage devices

•The system unit is the box that contains the central


electronic components of the computer, including the
computer’s processor, memory, and circuit boards.
•You’ll also find the power source and all the storage
devices (CD/DVD drive and hard drive) in the system
unit.
• In a notebook computer, the system unit, monitor, and
keyboard are combined into a single unit.
Imam - University 29
RAM vs. ROM
• Random access memory • Read-only memory (ROM):
(RAM): – Stores start-up instructions
– Stores instructions and data
– Permanent storage
– Temporary (volatile) storage
– Consists of several memory
cards or modules

•Random access memory (RAM) is a series of small cards or modules


plugged into slots on the motherboard. The CPU can request any data
in RAM. It is then located, opened, and delivered to the CPU for
processing in a few billionths of a second.
•Because all the contents of RAM are erased when you turn off the
computer, RAM is the temporary or volatile storage location for the
computer.
•To save data more permanently, you need to save it to the hard drive
or to another permanent storage device such as a CD or flash drive.
•Read-only memory (ROM) holds all the instructions the computer
needs when it is powered on. The data does not get erased when the
power is turned off.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 30
The Front Panel
• Power control
• Drive bays
• Memory card
reader
• Productivity ports

•The front panel of your computer provides you with access to power controls as well
as to the storage devices on your computer.
•Drive bays are special shelves reserved for storage devices. Some drive bays are
internal (cannot be seen from outside the system unit) and others are external, such
as CD and DVD drives.
•Some PCs include memory card readers and productivity ports on the front,
including USB and FireWire, used for peripherals and image downloading.
Imam - University 31
Power Controls
• Power-on button: Turns on system, should not be
used to turn it off
• Other options:
– Sleep mode
– Hibernation

•Your system has a power-on button on the front panel. Although you use this
button to turn on your system, you don’t want to use it to turn off your system. You
turn off the power by clicking on a shutdown icon on the desktop.
•When your computer enters Sleep mode, all the documents, applications, and data
you were using are stored in RAM, from which they are quickly accessible upon
restarting your computer.
•Hibernation is another power-saving mode that stores your data in memory and
saves it to your computer's hard disk.
.

Imam - University 32
Drive Bays
• Internal drive bays:
– Cannot be access from outside the system
– Are reserved for internal hard drives
• External drive bays:
– Can be accessed from outside the system
– CD or DVD drives
– Floppy and zip drives
• Drive bays are special shelves reserved for storage devices.
• Internal drive bays cannot be seen or accessed from outside
the system unit. They are reserved for internal hard drives.
• External drive bays can be seen and accessed from outside the
system unit. External drive bays house CD and DVD drives, for
example. Empty external drive bays are covered by a faceplate.
• Some computers still have floppy or disc drives. However,
manufacturers are now charging extra for these and tend to
provide more USB ports to accommodate the use of flash
drives and external hard drives.
Imam - University 33
Hard Disk Drive
• Permanent (nonvolatile) storage
• Internal or external versions

• The hard disk drive is your computer’s primary


device for permanent storage of software and
documents.
• The hard disk drive is a nonvolatile storage device,
meaning that it holds the data and instructions your
computer needs permanently, even after the
computer is turned off.
• Originally, all hard disk drives were installed inside
the system unit. Today, external hard drives are
readily available.

Imam - University 34
Flash Drives/Flash Memory
• Flash drives (jump drives)
– Newer storage alternative
– Plug into USB ports
• Flash memory cards
– Slide into slots in the system

• Flash drives, sometimes referred to as jump drives, USB


drives, or thumb drives, are the new alternative to storing
portable data. They plug into USB ports.
• Several manufacturers now also include slots on the front of
the system unit in which you can insert portable flash
memory cards. Many notebooks also include slots for flash
memory cards. Flash memory cards let you transfer digital
data between your computer and devices such as digital
cameras, PDAs, smartphones, video cameras, and printers.
Imam - University 35
Storage Media Capabilities

•Here you see the storage capacities of the various


portable storage media used in your computer’s
drive bays. As you learned, storage capacity is
Imam - University
measured in bytes. 36
On the Back
• Ports for peripherals
• Types of ports:
– Serial and parallel
– Audio and video
– USB
– FireWire
– Connectivity
• Ethernet
• Modem

• Ports are the places on the system


• unit where peripheral devices attach to the computer so that
data can be exchanged between them and the operating system.
• Some ports are on the front of the system unit.
• The ports on the back of the computer are mostly designed for
long-term connections
Imam - University 37
Inside the System Unit
• Essential electronic
components used to
process data
• Types of components:
– Power supply
– Hard disk drive
– Motherboard
– CPU
– Expansion cards

•The system unit contain


•s the essential components of a computer. Inside are the power supply,
motherboard, RAM, storage drives, expansion cards, and central processing
unit. Today’s personal computer follows the same design concept as IBM’s first
PC in 1981 did. All the components have evolved, but the foundation and
concepts are the same.
Imam - University 38
The Motherboard
• CPU
• RAM
• Expansion
cards and
slots
• Built-in
components
•The motherboard is the key circuit board holding the essential
processing parts. Attached directly to the motherboard are the
CPU, RAM, expansion cards, and in many new computers,
networking, modem, video, and audio components.
Imam - University 39
Central Processing Unit (CPU)
• Referred to as the “brains” of the computer
• Controls all functions of the computer
• Processes all commands and instructions
• Can perform billions of tasks per second

•The central processing unit (CPU, or processor)


• is the largest and most important chip
• in the computer.
• It is sometimes referred to as the “brains”
• of the computer because it
•controls all the functions performed by the
computer’s other components and processes all the
commands issued to it by software instructions.
•Modern CPUs can perform three billion tasks a
second without error, making them extremely
powerful components.
Imam - University 40
Expansion Cards
• Add functions
• Provide new connections for peripheral devices
• Common types:
– Sound
– Modem
– Video (VGA)
– Network (NIC)

•The various circuit boards connected to the motherboard have specific


functions that augment the computer’s basic functions.
•Some provide connections to other devices; these are usually referred
to as expansion cards. Typical expansion cards found in the system
unit are the sound card and the video card.
•Other expansion cards provide a means for network and Internet
connections, such as the network interface card (NIC), which enables
your computer to connect with other computers.

Imam - University 41
Setting It All Up: Ergonomics
•In terms of computing, ergonomics refers to how you set
• Ergonomics: minimizing injury or up your computer and other equipment to minimize your
risk of injury or discomfort.
• discomfort while •The following are some guidelines that can help you
• using the computer avoid discomfort, eyestrain, or injuries while you’re
working at your computer:
• Steps to follow: Position your monitor correctly. This should be at least 25
– Position monitor correctly inches from your eyes and at eye level or so that it is at
– Use adjustable chair an angle 15 to 20 degrees below your line of sight.
– Assume proper position
Purchase an adjustable chair. Adjust the height of your
– while typing chair so that your feet touch the floor. The chair should
– Take breaks include back support.
– Ensure adequate lighting
Assume a proper position while typing. Your wrists should
be flat with respect to the keyboard, and your forearms
should be parallel to the floor. Specially designed
ergonomic keyboards and wrist rests can help you
achieve the proper position for your wrists.

Take breaks from computer tasks.

Ensure that the lighting is adequate. 42


Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
Using proper equipment that is adjusted correctly helps
prevent repetitive strain injuries while working at a
computer.

Imam - University 43
Chapter Summary
1. What exactly is a computer, and what are its four main
functions?
2. What is the difference between data and information?
3. What are bits and bytes, and how are they measured?
4. What devices do I use to get data into the computer?
5. What devices do I use to get information out of the
computer?
6. What’s on the motherboard?
7. Where are information and programs stored?
8. How are devices connected to the computer?
9. How do I set up my computer to avoid strain and injury?

Imam - University 44
The End

Next :
Chapter 3: Application Software: Programs That Let You Work and
Play

Imam - University 45
Computer Skills For Preparatory
Programs
Chapter 3
Application Software:
Programs That Let You Work and Play
Note
This chapter discusses the kinds of software you can use to perform
a variety of tasks, from simple word processing to digital image
editing. We’ll also discuss how you can buy software, what the
different versions of software mean, how you can legally get free
software from the Web, and how you install and uninstall software
safely on your system.

Imam - University 1
Chapter Topics
• Application vs. system software
• Productivity software
• Multimedia software
• Entertainment software
• Educational and reference software
Note
Topics in this chapter include:
• Application vs. system software
• Productivity software
• Multimedia software
• Entertainment software
• Educational and reference software
Imam - University 2
Chapter Topics (cont.)
• Drawing software
• Business software
• Getting help with software
• Acquiring software
• Installing and uninstalling software
Note
• Drawing software
• Business software
• Getting help with software
• Acquiring software
• Installing and uninstalling software
Imam - University 3
Software
• A set of instructions that tells the computer
what to do
• Two main types of software
– System software
– Application software
Note
•The term software refers to a set of instructions that tells
the computer what to do. These instruction sets, also
called programs, provide the means for us to interact with
and use the computer.
•Your computer uses two basic types of software: system
software, which helps run the computer, and application
software, which was created for a specific purpose.
Imam - University 4
System Software vs.
Application Software
System Software Application Software
• Coordinates • Programs used to
instructions between complete tasks
software and • Includes
hardware – Productivity software
• Includes – Specialty software
– Operating system – Entertainment software
– Utility programs – Educational and
reference software
– Personal software

Imam - University 5
Application Software
Word Processing
Note
•Here you see
Productivity
Spreadsheet
the various
Presentation
types of
productivity
software
Database
available.
Personal Information
Manager

Personal Finance

Imam - University 6
Application Software
Note
Image Editing
Here you see
Media the various
Audio Editing types of
media
software
Video Editing
available
Media
Management

Imam - University 7
Application Software
Home Entertainment Gaming Note
Here you see the
various types of
Education home entertainment
software available
Reference

Drawing

Imam - University 8
Application Software

Business Note
Home Business
Here you see the
various types of
Large Business business software
available
Specialized
Business

Imam - University 9
Productivity Software
Programs that enable you to perform
tasks required in home, school, and
business
• Word processing programs
• Spreadsheet programs
• Presentation programs
• Database programs
• Personal information manager programs

Imam - University 10
Note
•Productivity software includes programs that enable you to
perform various tasks generally required in home, school,
and business. This category includes word processing,
spreadsheet, presentation, database, and personal
information manager (PIM) programs.
•You might already be familiar with some productivity
software. For example, Microsoft Office consists of a word
processing program called Word, a spreadsheet program
called Excel, a presentation program called PowerPoint, a
database program called Access, and a PIM called Outlook.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 11


Word Processing Software
• Used to create and edit documents
• Features include:
– Quick and easy editing
– Formatting options
– Search-and-replace
– Translation
• Examples
– Microsoft Word
– Corel WordPerfect
– OpenOffice Writer
Note
•Word processing software was one of
the early applications that turned
computers into a necessity.
•Today’s word processors come with tools
that allow you to produce a wide range of
professional-looking documents such as
research papers, letters, and résumés.
Imam - University 12
Spreadsheet Software
• Used to perform
calculations and
numerical analyses
• Features include:
– Worksheets with cells
– Text, values, formulas,
and functions
– Automatic recalculation
– Graphs and charts
• Examples
– Microsoft Excel
– OpenOffice Calc
Imam - University 13
Note
•Spreadsheet software enables you to do calculations and numerical analyses
easily. You can use spreadsheet software to create a budget and to evaluate
different scenarios such as planning a loan payment strategy.
•The basic element in a spreadsheet program is the worksheet, columns and rows
of which form boxes called cells. There are several types of data you can enter
into a cell:
-Text is letters, numbers, and symbols used as labels to identify the contents of
the worksheet.
-Values are numeric data entered either directly or as a result of a calculation.
-Formulas are equations that you build yourself.
-Functions are formulas that are preprogrammed into the spreadsheet software.
•The primary benefit of spreadsheet software is what-if analysis—the ability to test
different assumptions.
•You can display numbers in a graphical format.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 14


Presentation Software
• Used to create slide
shows
• Features include:
– Templates and
layouts
– Animations
– Transitions
• Examples
– Microsoft PowerPoint
– OpenOffice Impress
– Zoho Show
Imam - University 15
Note
•You use presentation software to create presentations,
such as the one shown here.
•Basic features include a variety of slide layouts and
design templates.
•You can use animation effects to control how and when
text and other objects enter and exit each slide. Similarly,
slide transitions add different effects as you move from
one slide to the next during the presentation.
•With some of the new capabilities in PowerPoint 2010,
you can embed online videos, as well as change the color,
add effects, and even trim video clips without the need for
a separate video editing program

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 16


Database Software
• Used to store and organize data
• Features include:
– Ability to group, sort, and filter data and
generate reports
– Organized into fields, records, and tables
• Examples
– Microsoft
Access
– Oracle
– MySQL
Imam - University 17
Note
•Database software programs are powerful applications that allow you to
store and organize data that can be used to track clients, invoices, and
personnel information.
•Spreadsheet applications include many database features and are easy
to use for simple database tasks such as sorting, filtering, and organizing
data. However, you need a more full-featured database application to
manage larger and more complicated groups of data that contain more
than one table or when you need to group, sort, and retrieve data and
generate reports.
•Traditional databases are organized into fields, records, and tables. A
field is a data category such as “First Name.” A record is a collection of
related fields. A table groups related records together.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 18


Note Taking Software
• Microsoft OneNote
– Allows students who have Tablet PCs to write their notes
directly onto the tablet, using it as an electronic notebook
– Can be used with a notebook or desktop computer, typing
the information onto the sheets, and then the pieces of text
can be easily moved around the page
– Has co-authoring and version tracking capabilities
Note
Free note taking software examples:
•Evernote allows you to take notes via the Web, your phone, or your computer
and then sync your notes between the Web, your phone, and any computer.
You can save text, audio, and images, as well as screen captures, Web pages,
and photos.
•StickyNotes are digital equivalents of paper sticky notes. These notes can be
customized, saved, and shared via e-mail, and they even have reminders
Imam - University 19
Personal Information
Manager Software
• Used to replace the management tools found on a
traditional desk
• Features include:
– Calendar, address book, notepad, to-do list
– Some contain e-mail management features
• Examples
– Microsoft Outlook
– Lotus Organizer

Note
•Most productivity software suites contain some form of personal information manager
(PIM) software. These programs strive to replace the management tools found on a
traditional desk, such as a calendar, address book, notepad, and to-do list.
•Some PIMs contain e-mail management features so that you can receive and send e-
mail messages, and also organize them into various folders, prioritize them, and
coordinate them with other activities in your calendar.
20
Productivity Software Tools
• Wizards
– Step-by-step guides that help you complete a task
• Templates
– Predesigned forms included with software
• Macros
– Small programs that group a series of commands to run as a
single command
Note
Whether you are working on a word processing document, spreadsheet, database, or
slide presentation, there are several tools you can use to increase your efficiency:
•Wizards are step-by-step guides that walk you through the necessary steps to
complete a complicated task. At each step, the wizard asks you questions. Based on
your responses, the wizard helps you complete that portion of the task.
•Templates are forms included in many productivity applications that provide the basic
structure for a particular kind of document, spreadsheet, or presentation.
•Macros are small programs that group a series of commands to run as a single
command. Macros are best used to automate a routine task or a complex
series of commands that must be run frequently.
21
Integrated Software Applications
vs. Software Suites
Integrated Software Software Suite
Application • Collection of stand-
• Single program that alone software
incorporates many programs packaged
software programs together
• Complex features are
not included • Share common menus
and toolbars
• Less expensive
• Example: Microsoft • Integrate well
Works • Developers: Microsoft,
Corel, and Lotus
Imam - University 22
Note
•An integrated software application incorporates the most commonly used
tools of many productivity software programs into one integrated stand-
alone program. They don’t include many of the more complex features of
the stand-alone productivity software applications and cost less than
individual programs.
•Microsoft Works is an example of an integrated software application that
includes word processing, spreadsheet, and database functionality.
•A software suite is a group of software programs bundled together as a
package. Because the programs come from the same developer, they
work well together and share common features.
•Microsoft Office is one example of the many types of software suites on
the market today. You can also buy different versions of the same suite,
the difference among them being the combination of software
applications included in each version

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 23


Personal Financial Software
• Used for:
– Tax preparation
• Intuit TurboTax
• H&R Block At Home
– Financial planning
• Intuit Quicken
• Microsoft Money
• Web-based programs (e.g.,
Mint.com, Wesabe.com)
Note
•Tax preparation software enables you to prepare your taxes
on your own rather than hiring a professional. Each program
offers a complete set of tax forms and instructions as well as
expert advice on how to complete each form. TurboTax and H
& R Block At Home software also have Web-based versions.
•Financial planning software helps you manage your daily
finances. These programs include electronic checkbook
registers and automatic bill payment tools. With these
features, you can print checks from your computer or make
your regular monthly payments with automatically scheduled
online payments. Web-based programs are also gaining in
popularity. These can also be accessed from smartphones.
24
Media Software for Home

Note
•Next we look at several popular
types of multimedia software.

Imam - University 25
Digital Image Editing Software
• Used to edit photographs Note
and other images •Image editing software (sometimes called photo editing
– Remove red-eye software) enables you to edit photographs and other
– Modify contrast images.

– Fix scratches •Image editing software includes tools for basic


modifications to digital images such as removing red-eye,
• Examples modifying color hues, and removing scratches or rips from
– Adobe Photoshop scanned images of old photos.
– Microsoft Photo Story •Many of these software packages now also include an
extensive set of painting tools such as brushes, pens, and
– Google Picasa
artistic-type mediums that allow you to create realistic-
looking images as well.
•Adobe Photoshop is a full-featured image editing
software application. Other image editing programs are
geared toward the casual home user and are included
with digital cameras.
•Other photo software makes it easy to use digital images
in new ways. In Microsoft’s Photo Story, you can add text,
music, and camera movement to create full-featured slide
shows. Using Google’s Picasa, you can create posters or
collages. Both products are free 26
Digital Audio Software
• Used to edit audio files in formats such as MP3, WAV,
WMA, and AIFF
• Most popular is MP3: Compresses audio file size
• Hundreds of applications allow you to rip, play, and
organize MP3s
• Features include recording, editing, adding special
effects, and format conversion
Note
•You might have a variety of audio files on your hard drive from subscriptions to
podcasts, digitizing CDs, or your own compositions.
•MP3, short for MPEG-1 Audio Layer 3, is an audio compression format that reduces
the file size of traditional digital audio files so more files take up less storage
capacity.
•Because of the popularity of MP3 files, hundreds of digital audio software
applications are available to allow you to copy (or rip), play, edit, and organize your
MP3 files.
• Audio editing software includes tools that allow you to record and
edit audio files as well as add special sound effects and
27
convert between different audio file formats.
Digital Video Editing Software
• Used to create and edit Windows Media Player, Apple
QuickTime, or RealPlayer video files
• Examples
– Adobe Premiere Pro
– Microsoft Live Movie Maker
– Apple iMovie HD
• Buy the application that supports your file format
• Many portable devices play MP4 format
Note
•Create and edit videos with digital video editing software.
•Different video editing software programs support only a few
types of video formats, so choose the one that lists the types
of video files you want to edit.
•One popular format is MP4, which is similar to the MP3
format in that it compresses audio and video content into
more manageable file sizes. This format can be watched on
an iPod, for instance. 28
Media Management Software
• Software to organize media files
– Sort, filter, and search by artist, album, or category
• Examples
– Windows Media Player
– Nullsoft Winamp
– Apple iTunes
• Manage tracks and generate playlists
• Burn songs to CDs and print liner notes
Note
•Many people add hundreds or even thousands of media files to their hard disk drive.
Media management software helps them find what they're looking for.
•Software such as Windows Media Player, Nullsoft Winamp, or Apple iTunes organizes
audio and video files so you can sort, filter, and search your music collection by artist,
album, or category.
•You can manage individual tracks, generate playlists, and even export the files to a
database or spreadsheet application.
•You can burn songs to a CD, and the program will print liner notes that you can place
inside the CD case. 29
Online Photo Management
• Web-based sites allow easy management and
sharing of digital photos
• Allow creation of photo albums
• Offer professional printing services
• Examples
– Snapfish.com
– Kodak.com
– Shutterfly.com
– Flickr.com

Note
•Web-based sites like Snapfish.com, Kodak.com, and
Shutterfly.com allow you to edit, store, and share digital photos.
•You can create personalized online photo albums and have
pictures or entire albums printed professionally.
•Google Picasa and Flickr.com offer additional photo sharing
applications. 30
Software Fun for Home
• Computer games require appropriate:
– Processing power
– Memory (RAM)
– Hard disk capacity
– Sound card
– Video card
– Speakers
– Monitor
– CD or DVD drive
– Specialized controllers
Note
•Computer games make up the vast majority of entertainment software.
•As with any computer software, you need to make sure your system has enough processing
power, memory (RAM), and hard disk capacity to run the program. Because games often
push the limit of sound and video quality, you need to ensure your system has the
appropriate sound cards, video cards, speakers, monitor, and CD or DVD drives as well.
•Some software might require a special controller to play the game. The controllers for Rock
Band are pictured here.
31
Game Rating System
• The Entertainment Software Rating Board
(ESRB) provides:
– Rating symbols
• Everyone (E)
• Teens (T)
• Mature (M)
• Adult Only (AO)
– Content descriptors
Note
•The Entertainment Software Rating Board (ESRB) was established
in 1994 by the Entertainment Software Association.
•The ESRB’s rating system has two parts: rating symbols that
suggest age appropriateness, and content descriptors that point out
elements that triggered the rating.
32
Educational and
Reference Software
Educational Software
• Provides instruction
• Types include:
– K–12 education
– Skill development
– Test preparation
– Brain training
– Simulations
– Online courses
Note
•Educational software refers to the variety of software applications
on the market that offer some form of instruction or training.
•Electronic reference software such as encyclopedias, atlases, and
dictionaries are available on CDs and DVDs as well as online

33
Drawing Software
• Used to create and edit
– Two-dimensional drawings
– Technical diagrams
– Animations
– Geometric shapes
• Examples
– Adobe Illustrator
– Microsoft Visio
Note
•Drawing software (or illustration software) lets you create or edit two-dimensional, line-
based drawings such as technical diagrams or original nonphotographic drawings,
animations, and illustrations using standard drawing and painting tools such as pens, pencils,
and paintbrushes.
•Software applications such as Adobe Illustrator include tools that let you create professional-
quality illustrations.
•Microsoft Visio is a program used to create technical drawings, maps, basic block diagrams,
networking and engineering flowcharts, and project schedules.
34
Business Software for Home
and Office
• Programs for home business
– Accounting software
– Desktop publishing software
– Web page authoring software
Note
If you run a business from your home, there are several helpful
programs to consider. We look at each of the programs listed
and the functions they perform over the next few slides

35
Accounting Software
Helps small-business owners efficiently manage
their finances
Provides tools for tracking accounts receivable
and accounts payable
Includes templates for invoices, statements, and
financial reports
Examples
Intuit QuickBooks
Peachtree by Sage
• Note
•A number of software packages are designed to organize and help with the day-to-day operations of a
typical business.
•Accounting software helps small-business owners manage their finances more efficiently by providing
tools for tracking accounts receivable and accounts payable.
•In addition, these applications offer inventory management plus payroll and billing tools.
•Examples of accounting software applications include Intuit QuickBooks and Peachtree by Sage. Both
programs include templates for invoices, statements, and financial reports so that small-business owners
can create common forms and reports.
36
Desktop Publishing Software
• Used to arrange text and graphics for
publications
• Features include:
– Text formatting
– File importing
– Graphics tools
– Web publishing
• Examples
– QuarkXPress
– Adobe InDesign
Note
•Desktop publishing (DTP) software allows you to incorporate and arrange graphics
and text in your documents in creative ways.
•DTP programs offer a variety of tools with which you can format text and graphics.
You can easily change the font, size, and style of your text as well as arrange text
on the page in different columns, shapes, and patterns. You can import files into
your documents from other sources and manipulate graphics. DTP programs also
include features that allow you to publish to the Web.
37
Web Page Authoring Software
• Knowledge of HTML is not necessary
• Features include:
– Wizards and templates
– Reference materials
– Interactive content
• Examples
– Microsoft Expression Web
– Adobe Dreamweaver
• Office applications can save a document as a
Web page
Note
•Web page authoring software allows even the novice user to design interesting
and interactive Web pages without knowing any HTML code.
•Web page authoring applications often include wizards, templates, and reference
materials to help you easily complete most Web page authoring tasks.
•Most Microsoft Office programs, such as Word, have options to convert your file
to a Web page 38
Large Business Software
• Used across a variety of industries
• Includes:
– Business and marketing plan software
– Project management software
– Customer relationship management (CRM)
software
– Enterprise resource planning (ERP) systems
– E-commerce solutions

Imam - University 39
Note
•There are specialized programs for a number of important business tasks, like
writing business and marketing plans.
•Project management software, such as Microsoft Project, helps project managers
easily create and modify scheduling charts so they can plan and track specific
project tasks and coordinate personnel resources.
•Customer relationship management (CRM) software is used to store sales and
client contact information in one central database. Sales professionals use CRM
programs to get in touch and follow up with their clients. GoldMine from FrontRange
Solutions is an example of a CRM program.
•Enterprise resource planning (ERP) systems are used to control many back-office
operations and processing functions such as billing, production, inventory
management, and human resources. ERP systems are implemented by third-party
vendors and matched directly to the specific needs of a company.
•E-commerce software offers bundled Web site creation and hosting services,
shopping cart setup, and credit card processing services. For larger businesses,
specialized software to handle each aspect of e-commerce is available; alternatively,
a large business might develop proprietary software tailored to its specific needs.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 40


Mapping Software
• Provides nationwide street maps and directions
• Supplies geographic data for decision making
• Available versions
– Online
– PC
– Smartphone
– GPS devices

Note
•Mapping programs, such as DeLorme Street Atlas USA and Microsoft Streets &
Trips, are perfect for businesses that require a lot of travel.
•Online mapping services such as MapQuest and Yahoo! Maps are accessible
from anywhere with Internet access.
•Mapping software is also available for smartphones and cars.
•Google Earth and Google Maps are examples of a geographic information system
(GIS), which provides data for complex business decisions

Imam - University 41
Specialized Business Software
• Vertical market software: Tailored to the needs of a particular
industry
• Examples
– Estimating software
– Property management software
– Scheduling and dispatching software
• Proprietary software can be custom developed for a company

Note
•Some software applications are tailored to the needs of a particular industry and are
called vertical market software.
•For example, the construction industry uses software such as Sage Master Builder,
which features estimating tools to help construction companies bid on jobs. Other
examples of vertical market software include property management software for real
estate professionals and scheduling and dispatching software for emergency services.
•In addition to specific business software applications that companies can buy off the
shelf, programs can also be custom developed to address the specific needs of a
particular company. These custom applications are often referred to as proprietary
software because they are owned and controlled by the company that uses them
42
Computer-Aided Design Software
• Used to create 3D models
• Applications for architecture, automotive,
aerospace, and medical engineering
industries
• Example: Autodesk’s AutoCAD
Note
•Computer-aided design (CAD) programs are a form of 3D modeling that
engineers use to create automated designs, technical drawings, and model
visualizations.
•Specialized CAD software is used in the architecture, automotive,
aerospace, and medical engineering industries, among others.
•With CAD software, architects can build virtual models of their plans and
readily visualize all aspects of the design before actual construction.
•Full-featured packages are available, as well as simpler open source
programs and Web-based versions. 43
Getting Help with Software
• Types of help
– Frequently asked questions (FAQs)
– Online help
and support
– ScreenTips
– MS Office integrated help

44
Note
•If you need help while working with software, there are several resources you can access to find
answers to your questions.
•For general help or information about the product, many Web sites offer frequently asked
questions (FAQs), which include answers to the most common questions.
•Some programs also offer online help and support. Sometimes, online help also allows you to
chat with a member of an online support team.
•Some applications are context-sensitive and offer help based on the task you’re doing or
ScreenTips to explain where your cursor is resting.
•In Microsoft Office applications, on the far, top right of the screen, you’ll find a question mark
icon. This takes you to the main Help interface. Integrated help means that the documentation is
built directly into the program. You type a question, search for a term, or browse the help topics.
•There is a Help menu on the menu bar of most applications where you can choose to search an
index or content outline to find out the nature of almost any feature.
•There are also many online sites, such as MalekTips.com, that provide a vast array of
multimedia help files and tutorials.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 45


Software Licenses
• You buy a license, not the software itself
• Check license for:
– Ultimate owner of software
– Number of installations allowed per license
– Per computer, per user, or per family (Apple)?
– Warranties
• Multiuser licenses available
– Per-seat
– Concurrent
Imam - University 46
Note
•Unlike other products, when buying software you are usually buying a
license for one installation instance of the software and not the
software itself.
•You need to check the license to find answers to the following
questions:
•Who is the ultimate owner of the software?
•How many installations are allowed per license?
•Is the license for use per computer or per user?
•What warranties, if any, are offered?
•Family or multiuser licenses might also be available. Some multiuser
licenses are per-seat and limit users to a specific number, whereas
concurrent licenses limit the number of users accessing the software
at the same time

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 47


Acquiring Software
• Software can be purchased
– Through retail stores
– Online
– By mail order
• Preinstalled software
• Web-based application software
– Hosted on a Web site
– Requires no installation on your computer
• Discounted software
• Custom-developed software

Imam - University 48
Note
•You can find software in almost any retail environment. Additionally,
you can purchase software online, through mail order companies, or on
auction sites such as eBay.
•Virtually every new computer comes with some form of application
software installed, although the applications depend on the hardware
manufacturer and the computer model. You can usually count on your
computer having some form of productivity software preinstalled.
•Web-based application software is a program hosted on a Web site
and does not require installation on your computer.
•If you’re a student or an educator, you can purchase software that is
no different from regularly priced software at prices sometimes
substantially lower than general consumer prices.
•You can also buy software that is custom developed to your specific
needs. A company such as Ascentix Corporation acts as the
intermediary between you, the user, and the software developer

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 49


Freeware and Shareware
• Freeware: Copyrighted software you can use for free
• Beta versions: Programs still under development
• Shareware: Software that allows users to run it for a
limited time for free
• Open source: Free to use
Note
•Freeware is any copyrighted software you can use for free.
•Some software developers offer beta versions of their software free of charge. Beta
versions are still under development. By distributing free beta versions, developers
hope to have users report errors or bugs they find in the program. This helps them
correct any errors before they launch the software on the market at retail prices.
•Software that allows users to test software (run it for a limited time free of charge) is
referred to as shareware. Shareware is not freeware. If you use the software after the
initial trial period is over, you will be breaking the software license agreement.
•Open source software is free to use on the condition that any changes you make to
improve the source code also must be distributed for free.

Imam - University 50
Software Versions
• Numbers are used to represent major and
minor upgrades
– Major upgrade: Version 2.0
– Minor upgrade: Version 2.1
• Years (Microsoft Office 2010) and letters
(WordPerfect Office X3) are also used
• When an upgrade is released, consider if it
is cost-effective to purchase it

Imam - University 51
System Requirements
• Minimum standards for the operating system, processor,
RAM, and hard drive capacity
• Specifications for video card, monitor, CD drive, and
other peripherals
• Need sufficient storage, memory capacity, and
processing capabilities
Note
•Every software program has a set of system requirements that specify
the minimum recommended standards for the operating system,
processor, primary memory (RAM), and hard drive capacity. Sometimes
there are other specifications, such as for the video card, monitor, CD
drive, and other peripherals. These requirements are generally printed
on the software packaging or viewable on the publisher’s Web site.
•Before installing software on your computer, ensure that your system
setup meets the minimum requirements by having sufficient storage,
memory capacity, and processing capabilities 52
Installing/Uninstalling Software
• Installing software from CD or DVD
– Installation wizard
– Choose full or custom installation
• Downloading software from the Web
– Unzip files
– Launch setup program
• Uninstalling software
– Software uninstall utility

Imam - University 53
Note
• When you buy software, you insert the CD or DVD that contains the program files, and
for most programs being installed on a PC, an installation wizard automatically opens.
By simply following the steps indicated by the wizard, you can install the software
application on your system.
• If, for some reason, the wizard doesn’t open automatically, the best way to install the
software is to go to the Programs and Features icon located in the Control Panel on the
Start menu. This feature locates and launches the installation wizard.
• One of the first steps in the installation wizard is deciding between a full installation and
a custom installation. A full installation copies all the files and programs from the CD to
your hard drive. By selecting a custom installation, on the other hand, you can decide
which features you want installed on the hard drive.
• When you download software from the Internet, everything you need is contained in one
zipped file. For the most part, these downloaded files unzip themselves and launch the
setup program.
• Uninstalling software in Windows requires using the uninstall utility. Most software
programs load a series of files into different system locations to support their operation.
When uninstalling, all of these files need to be removed, and the only good way to do
this is through the uninstall utility.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 54


Computer Skills For Preparatory
Programs
Chapter 4
Using System Software:
The Operating System, Utility Programs,
and File Management
This chapter discusses system software and how vital it is to your
computer. We examine the operating system (OS), by looking at the
different operating systems on the market as well as the tasks the OS
manages. We’ll also discuss how you can use the OS to keep your
files and folders organized so that you can use your computer more
efficiently. Finally, we’ll look at the many utility programs included as

system software on your computer .


Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 1
Chapter Topics

• System software
• Categories of operating systems
• OS role in:
– Providing user interaction
– Managing the processor
– Managing memory
– Managing hardware
– Interacting with application software
– Starting the computer

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 2


Chapter Topics (cont.)
• Desktop and Windows features
• OS role in keeping the desktop organized
• Utility programs

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 3


System Software: The OS
• Controls computer functions (hardware, processor,
memory, peripheral devices)
• Provides means for software to work with CPU
• Responsible for management, scheduling, and
interaction of tasks
• Provides user interface
•System software consists of two primary types of programs: the operating
system and utility programs.
•The operating system (OS) is the main program that controls how your
computer system functions. The OS manages the computer’s hardware,
including the processor, memory, and storage devices, as well as peripheral
devices. The operating system also provides a consistent means for software
applications to work with the CPU. Additionally, it is responsible for the
management, scheduling, and interaction of tasks. Your first interaction with the
OS is the user interface.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 4


System Software: Utilities
• Utilities: Programs that perform computer
housekeeping tasks
– Backup
– Security
– Diagnostic
– Recovery
•System software also includes utility programs.
These are small programs that perform many of the
general housekeeping tasks for the computer, such
as those listed on the slide.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 5
Operating System Categories
• Traditionally included four categories:
– Single-user, single-task
• Example: MS-DOS
– Single-user, multitask
• Example: Apple’s Mac OS
– Multiuser
• Example: Microsoft Windows
– Real-time (RTOS)
• Example: found in measurement instruments
•Today the lines are beginning to blur between the traditional categories as operating
systems continue to become more powerful.
•Single-user, single-task operating systems are proprietary systems developed
specifically for the devices they manage.
•Single-user, multitask operating systems are available commercially for personal
and business use.
•Multiuser operating systems coordinate resources for many users on a network.
•Real-time operating systems don’t require the intervention of any users at all.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 6


Real-Time Operating Systems
• Systems with a specific
purpose and a certain result
• Uses include:
– Automobiles
– Printers
– VoIP phones
– Medical devices
– Robotic equipment

•Machinery that performs a repetitive series of specific tasks in an exact amount of


time requires a real-time operating system.
•This type of operating system is a program with a specific purpose.
•For example, instruments such as those found in the scientific, defense, and
aerospace industries that must perform regimented tasks or record precise results
require real-time operating systems.
•Real-time operating systems are also found in fuel-injection systems in car engines,
inkjet printers, VoIP phones, medical devices, and robotic cameras.
•Real-time operating systems require minimal user interaction. The programs are
written specifically to the needs of the devices and their functions. Therefore, there
are no commercially available standard RTOS software programs.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 7
Multiuser Operating Systems
• Known as network operating systems
• Allow access to the computer system by more than one user
• Manage user requests
• Systems include:
– Linux
– UNIX
– Windows Vista and Windows 7
– Mac OS X
– i5/OS •A multiuser operating system (also known as a network
– z/OS operating system) enables more than one user to access the
computer system at one time by efficiently juggling all the
requests from multiple users.
•Networks require a multiuser operating system because many
users access the server computer at the same time and share
resources.
•Examples include Linux, UNIX, and IBM’s i5/OS and z/OS.
•The latest versions of Microsoft Windows and Mac OS X can
also be considered multiuser operating systems because they
allow the creation of home networks without any requiring
additional operating systems.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 8


UNIX
• Multiuser, multitask operating system
• Used primarily with mainframes
• Also found on PCs
• Vendors can modify the code:
– Hewlett-Packard’s HP/UX
– Sun’s Solaris
– IBM’s AIX
•UNIX is a multiuser, multitask operating system used primarily with mainframes as
a network operating system, although it is also often found on PCs.
•The UNIX code was initially not proprietary. Rather, any programmer was allowed to
use the code and modify it to meet his or her needs.
•UNIX is now a brand that belongs to the company The Open Group, but any vendor
that meets testing requirements and pays a fee can use the UNIX name.
•Individual vendors can modify the UNIX code to run specifically on their hardware.
HP/UX from Hewlett-Packard, Solaris from Sun, and AIX from IBM are some of the
UNIX systems currently available in the marketplace.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 9


Mainframes and
Supercomputers
• Other computers utilizing multiuser operating
systems:
– Mainframes
• Handle requests from hundreds or thousands of users
simultaneously
– Supercomputers
• Used by scientists and engineers

•Multiuser operating systems are also used by mainframes and


supercomputers.
•Mainframe computers store, manage, and process data from hundreds
or thousands of users simultaneously.
•Scientists and engineers use supercomputers to solve complex
problems or perform massive computations.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 10
Single-User Operating Systems
Single-Task Systems Multitask
• Perform one task at a time Systems
• PDAs • Perform simultaneous tasks
– Palm OS • Smartphones
– Windows Mobile – Symbian OS
• Cell phone – iPhone OS
– Proprietary OS – Google Android
– Palm webOS

•When cell phones and PDAs were separate and single-


function devices, they required an OS that could perform one
task at a time.
•A convergence between the cell phone and PDA created the
smartphone, which requires an OS with multitasking
capabilities.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 11
Desktop and Notebook
Operating Systems
• An operating system combined with a processor is known as a
platform
– Microsoft Windows OS/Intel and AMD processors
– Apple Macintosh OS/Motorola, IBM, and Intel processors
• OS not interchangeable between platforms
• Application software is platform specific

•The combination of an operating system and a processor is referred to as a


computer’s platform.
•For example, Microsoft Windows operating systems are designed to coordinate with a
series of processors from Intel Corporation and AMD (Advanced Micro Devices) that
share the same or similar sets of instructions. Until recently, Apple Macintosh operating
systems worked primarily with processors from Motorola and IBM designed specifically
for Apple computers. Apple has recently adapted the Intel processor.
•You cannot load a Windows OS on a Mac computer or vice versa because the
processor would not understand and would not function properly.
•Application software comes in PC or Mac versions.
•PC and Mac computers can be networked to share files and peripheral devices.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 12


Microsoft Windows
• Multiuser, multitasking OS
• Windows 7 is the newest version
• Features
– Increased functionality
– User-friendliness
– Improved Internet capabilities
– Enhanced privacy and security

•Windows 7 is the most recent version of the Microsoft Windows operating


system. Improvements focus on increasing user functionality and
friendliness, improving Internet capabilities, and enhancing file privacy and
security. Many computers still run earlier versions, such as Windows Vista,
Windows XP, and Windows 95.
•Windows 7 comes in a number of versions, including Windows 7 Starter,
Windows 7 Home Premium, Windows 7 Professional, Windows 7
Enterprise, and Windows 7 Ultimate.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 13


Mac OS
• First commercially available OS with point-and-click technology (GUI)
• Excellent in:
– Graphics display
– Processing
– System reliability
– File backup
• Fewer applications available than for Windows
• More expensive
•In 1984, the Mac OS became the first commercially available operating system to
incorporate the user-friendly point-and-click technology known as a graphical user
interface (GUI) [pronounced gooey] in a commercially affordable computer.
•Macs have long been recognized for their superior graphics display and processing
capabilities. Users also attest to Mac’s greater system reliability and superior file
backup utilities.
•However, there are fewer software applications available for the Mac platform than for
the Windows platform, and Macs tend to be more expensive than Windows-based
PCs.
•The most recent version of the Mac operating system, Mac OS X Leopard, is based
on the UNIX operating system.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 14


Mac vs. Windows
• Similar functionality
• Streamlined user interface
• Window-like work areas on the desktop

Mac Windows
•Although the Mac OS and the Windows operating systems are not compatible, they are similar
in terms of functionality. Both have a streamlined user interface and window work areas on the
desktop that house individual applications and support users working in more than one
application at a time.
•Macs feature a Dock for the most commonly used programs and a Dashboard with widgets for
quick access to up-to-the-minute information such as stock prices.
•The latest versions of Windows have followed suit with a revised taskbar that has Dock-like
capabilities and Gadgets that are similar to Mac widgets.
•Despite their similarities, there are still differences that cause users to prefer one product over
the other.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 15
Linux
• Open source operating system
• Based on UNIX
• Stable system
• May be downloaded for free from the Internet
• Runs on PCs, netbooks, iPods, and gaming systems
• Allows you to choose desktop appearance
•In 1991, a Finnish graduate student named Linus Torvalds decided he would create a UNIX-like
operating system that could run on an Intel processor. His product, called Linux, was offered for free to
developers around the world and has been upgraded and improved continually since then.
•Linux is open source software, meaning that anyone can obtain the code for free and alter it. The
agreement is that improvements and methods must also be shared.
•Today, Linux is gaining a reputation as a stable operating system that is not subject to crashes and
failures.
•You can download the open source versions of Linux for free from the Internet. Versions have been
designed for use on PCs, netbooks, iPods, and gaming systems. However, there are several versions
of Linux that are more proprietary in nature. These versions come with support and other products not
generally associated with open source Linux. Red Hat has been packaging and selling versions of
Linux since 1994 and is probably the most well-known Linux distributor.
•Linux does not have a single default graphical user interface. One free interface allows you to select a
Windows or Mac desktop appearance.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 16


What the OS Does
• Provides a user interface
• Manages the CPU
• Manages memory and storage
• Manages hardware and peripheral devices
• Coordinates application software with the CPU

• The operating system provides a way for the user to interact with the
computer, manages the processor (CPU), manages the memory
and storage, manages the computer system’s hardware and
peripheral devices, and provides a consistent means for software
applications to work with the CPU.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 17


The User Interface
• Enables you to interact with
the computer
• Types of interfaces
– Command-driven interface
– Menu-driven interfaceCommand-driven
– Graphical user interface (GUI)
•The OS provides a user interface that enables you to interact
•with the computer.
•In early PCs, interaction with the OS
• was through a command-driven interface
•, meaning that the user had to type very specific commands to get
• the computer to load a program. The commands were not always easy to understand; therefore
the interface proved to be too complicated for the average user.
•The command-driven interface was later improved by incorporating a menu-driven interface in
which the user chooses a command from menus displayed on the screen. Menu-driven interfaces
eliminated the need to know every command because you could select most of the commonly used
commands from a menu. However, they were still not easy enough for most people to use.
•Most operating systems today use a graphical user interface (GUI). Unlike the command- and
menu-driven interfaces used earlier, GUIs display graphics and use the point-and-click technology
of the mouse and cursor, making operating systems much more user friendly.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 18


Processor Management
• Controls the timing of events the processor works on
– Multitasking - Interrupts - Interrupt table
- Interrupt handler - Stack
•Although the CPU is the brains of the computer,
•Every device has its own type of interrupt,
• it needs the OS to arrange for the execution of all
which is associated with an interrupt
• its activities in a systematic way.
handler, a special numerical code that
•To do so, the OS assigns a slice of its time to each
prioritizes the requests. These requests
activity requiring the
are placed in the interrupt table in RAM.
• CPU’s attention. The OS then switches between
•In our example, the OS pauses the CPU
•processes thousands of times a second so it
from its typing activity when it receives the
appears that everything is happening seamlessly.
interrupt from the printer and puts a
•When the OS allows you to perform more than one
“memo” in a special location in RAM called
task at a time, it is said to be multitasking.
a stack. The memo is a reminder of where
•The OS processes a task assigned a higher
the CPU was before it left off so that it can
priority before processing a task that has been
work on the printer request.
assigned a lower priority. This is called preemptive
•The CPU then retrieves the printer
multitasking.
request from the interrupt table and begins
•For example, assume you’re typing and you want
to process it. Upon completion of the
to print a file. When you tell your computer to print
printer request, the CPU goes back to the
the file, the printer generates a signal called an
stack, retrieves the memo it placed about
interrupt that tells the OS it is in need of attention.
the typing activity, and returns to that task
until it is interrupted again.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 19
OS Architecture
• More than 4 GB of RAM
– 64-bit system
• Windows Vista
• Windows 7
• Make sure applications and devices are compatible
•Computers with more than 4GB of RAM feature 64-bit
versions of Windows.
• Previous Windows versions used the traditional 32-bit
operating system architecture.
•The newer 64-bit systems provide added responsiveness
to users running several applications at the same time
and switching between them frequently.
•If you purchase a 64-bit operating system, make sure
your hardware and software are compatible.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 20


Virtual Memory
• Instructions and data are stored on the hard drive when RAM is full
– Swap file
•RAM has limited capacity. When there isn’t enough room in
– Paging RAM for the OS to store the required data and instructions, it
– Thrashing borrows room from the hard drive.
•This process of optimizing RAM storage by borrowing hard
drive space is called virtual memory.
•When more RAM space is needed, the OS swaps out from
RAM the data or instructions that have not been recently used
and moves them to a temporary storage area on the hard
drive called the swap file.
•If the data and/or instructions in the swap file are needed
later, the OS swaps them back into active RAM and replaces
them in the hard drive’s swap file with less active data or
instructions. This process of swapping is known as paging.
•Eventually your computer will become sluggish as it is forced
to page more and more often. This condition of excessive
paging is called thrashing.
•The solution to this problem is to increase the amount of
RAM in your system so that it can avoid having to send data
and instructions to virtual memory.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 21


Hardware and Peripheral
Device Management
• Device drivers
– Programs that enable the operating system to communicate with peripheral
devices
– Provided by the manufacturer of the device
• Plug and Play
– Hardware and software standard
– Facilitates the installation of new hardware

•Each device attached to your computer comes with a special program, called a device
driver, that facilitates communication between the device and the OS.
•The device driver translates the specialized commands of the device to commands that
the OS can understand, and vice versa. Thus, devices will not function without the proper
device driver because the OS would not know how to communicate with them.
•Today, most devices come with the driver preinstalled in Windows. Devices that have
drivers included in Windows are called Plug and Play (PnP).
•Plug and Play is not a driver. Instead, it is a software and hardware standard designed
to facilitate the installation of a new piece of hardware in computers by including in the
OS the driver the device needs to run.
•Plug and Play enables users to plug their new device into a port on the system, turn on
the system, and immediately use the device. The OS automatically recognizes the
device and its driver.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 22


Software Application
Coordination
• Application programming interfaces (APIs)
– Blocks of code contained in the operating system
– Coordinate the operating system with software applications
– Similar toolbars and menus
– Microsoft DirectX
•For software programs to work with a CPU, they must contain code that the
CPU recognizes. Rather than having the same blocks of code for similar
procedures in each software application, the OS includes the blocks of code that
software applications need.
•These blocks of code are called application programming interfaces (APIs).
•To create programs that can communicate with the operating system, software
programmers need only refer to the API code blocks in their individual application
programs rather than including the entire code in the application itself. Not only
do APIs avoid redundancies in software code, but they also make it easier for
software developers to respond to changes in the OS.
•Microsoft DirectX, for example, is a group of multimedia APIs built into the
Windows operating system that improves graphics and sounds when you’re
playing games or watching video on your PC.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 23
Starting the Computer
• The boot process
1. BIOS is activated.
2. A POST checks attached
hardware.
3. The OS loads into RAM.
4. Configuration and
customization settings are
checked.
•For a computer to go from a dead stop to ready for use, a start-up process is required. This is often
referred to as booting up the computer, or the boot process. The boot process consists of four basic
steps:
1. The basic input/output system (BIOS) is activated by powering on the CPU.
2. The BIOS checks that all attached devices are in place (called a power-on self-test, or POST).
3. The operating system is loaded into RAM.
4. Configuration and customization settings are checked.
•Once the boot process has completed these steps, the computer is ready to accept commands and
data.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 24


Handling Errors in the
Boot Process
• Safe mode
– Windows does not
boot properly
– Try rebooting
– Uninstall any new
devices or
software
•Errors during the boot process are often very simple to correct. It is helpful to
be aware of the most common problems.
•Sometimes Windows does not boot properly and you end up with a screen
with the words Safe Mode in the corners. Safe mode is a special diagnostic
mode designed for troubleshooting errors. When in Safe mode, only the
essential devices of the system (such as the mouse, keyboard, and monitor)
function. If, after you boot, you end up in Safe mode, try rebooting the
machine before doing anything else. If you still end up in Safe mode and if
you have recently installed new software or a new hardware device, try
uninstalling it.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 25
The Desktop

The desktop is the first interaction you have with the OS and the
first image you see on your monitor. As its name implies, your
computer’s desktop puts at your fingertips all of the elements
necessary for a productive work session that typically are found
on or near the top of a traditional desk, such as files and folders.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 26
Windows

•The standard window in Windows has consistent features.


Once a user is familiar with the setup of these features, he or
she will be immediately familiar with the windows in any
Windows-based software.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 27
Viewing Windows

• Side-by-side
• Stacked
• Cascading
• Flip 3D
•Tiling windows is a great way to see two windows at the same time.
• Windows Vista and Windows 7 give you the ability to “flip” through live 3D images of open
windows. You can also arrange windows in more traditional cascade, stacked, or side-by-side
arrangements by right-clicking an empty space on the taskbar.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 28


File Management
• The operating system provides an organizational
structure for the computer’s contents.
• Hierarchical structure of directories:
– Drives
• Folders
 Subfolders
» Files

• Windows 7: libraries
•An additional function of the OS is to enable file management, which entails
providing an organizational structure for the computer’s contents. The OS allows you
to organize the contents of your computer in a hierarchical structure of directories
that includes drives, folders, subfolders, and files.
•Windows 7 introduces the concept of libraries, which are folders that gather files
from different locations and display them as if they were all saved in a single folder,
regardless of where they are physically stored .
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 29
File Management

•If you use a Windows PC,


• Windows Explorer
• is the main tool for finding,
•viewing,
• and managing
• the contents of
• your computer by
• showing the location
•and contents of every drive,
•folder, and file.
•Details view, shown here, is the most interactive view. Files and folders
are displayed in list form, and the additional file information is displayed in
columns alongside the file name. You can sort and display the contents of
the folder by any of the column headings; you therefore can sort the
contents alphabetically by file name or type, or hierarchically by date last
modified or file size.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 30


•In Windows Vista and 7, Large Icon view replaces
Viewing and Thumbnails view from Windows XP. Large Icon
view shows the contents of folders as small images.
Sorting •There is also Extra Large Icon view, which shows
folder contents and other icons as even larger
Files and Folders images.
•Large and Extra Large Icon views are best to use if
your folder contains picture files. For those folders
• Many views available that contain PowerPoint presentations, the Title
– Large Icon view slide of the presentation will display so you can
easily distinguish between presentations.
– Extra Large Icon view •Tiles view displays files and folders as icons in list
– Tiles view form. Each icon includes the file name, the
application associated with the file, and the file size.
– List view The display information is customizable. Tiles view
– Small and Medium also displays picture dimensions, a handy feature
for Web page developers.
– Icon views
•List view is a display of even smaller icons and file
names. This is a good view if you have a lot of
content in a folder and need to see most or all of it
at once.
•Small and Medium Icon views also display files
and folders as icons in list form, but the icons are
either small or medium sized and include no other
file information than the file name. Additional file
information is displayed in a ScreenTip, however.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 31


File Name Extensions
Extension Type of Document Application
.doc Word processing document Microsoft Word 2003
.docx Word processing document Microsoft Word 2007
.wpd Word processing document Corel WordPerfect
.xlsx Spreadsheet Microsoft Excel 2007
.accdb Database Microsoft Access 2007
Microsoft PowerPoint
.pptx PowerPoint presentation
2007
Adobe Acrobat or
.pdf Portable Document Format
Adobe Reader
Any program that can
.rtf Text (Rich Text Format)
read text documents
Any program that can
.txt Text
read text documents
•Following the file name and after the dot (.) comes an extension, or file type. This extension
identifies what family of files the file belongs to or which application should be used to read the file.
•For example, if a file is a Word 2003 document, it has a .doc extension and is named something like
report.doc. If the file is created in Word 2007, the file extension is .docx and is named report.docx.
•When you save a file created in most applications running under the Windows OS, the extension is
automatically added for you.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 32
File Name Extensions
Extension Type of Document Application

Hyper Text Markup Language for Any program that can read
.htm or .html
a Web page HTML
Joint Photographic Experts Most programs capable of
.jpg
Group (JPEG) image displaying images
Graphic Interchange Format Most programs capable of
.gif
(GIF) image displaying images

.bmp Bitmap image Windows

.zip Compressed file WinZip

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 33


Naming Files
• File name: Name assigned plus file name extension
• Up to 255 characters
• Characters not legal in Windows file names: “ / \ * ? <
>|:
• Character not legal in Mac file names: :
• Mac file names are case sensitive

•The first part of a file, or the file name, is the name you
assign to the file when you save it.
•Each operating system has its own naming conventions.
Several are listed on the slide.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 34


File Path
• File path: Location of the file

•You can tell the location of a file by its file path. The file path
starts with the drive on which the file is located and includes
all folders, subfolders (if any), the file name, and the
extension. For example, if you were saving a picture of Emily
Brontë for a term paper for an English composition course, the
file path might be C:\Users\Username\Documents\Spring
2010\English Comp\Term Paper\Illustrations\EBronte.jpg.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 35


Working with Files •Once you’ve located your file with Windows Explorer,
you can perform many other file management actions,
• File management actions such as opening, copying, moving, renaming, and
deleting files.
– Open •You open a file by double-clicking the file in its storage
location. The operating system then determines which
– Copy application needs to be loaded to open the requested
– Move file and opens the file within the correct application
automatically.
– Rename •You can copy a file to another location using the Copy
– Delete command. When you copy a file, a duplicate file is
created and the original file remains in its original
• Recycle Bin (Windows) location.
•To move a file from one location to another, you use
• Trash (Mac) the Move command. When you move a file, the original
file is deleted from its original location.
•The Recycle Bin is a folder on the desktop in Windows
where files deleted from the hard drive reside until you
permanently purge them from your system. Files in the
Recycle Bin can be easily restored to their original
location.
•Mac systems have something similar to the Recycle
Bin, called Trash.
•Files deleted from other drives, such as a floppy drive,
CD, flash drive, or network drive, do not go to the
Recycle Bin, but are deleted from the system
immediately.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 36
Utility Programs
• Small programs that perform special functions
– Manage system resources
– Create a pleasant environment
– Improve efficiency

•Utility programs are small applications that perform special


functions.
•Some utility programs (such as disk defragmenter utilities)
manage system resources; others (such as screen savers) help
make your time and work on the computer more pleasant; still
others (such as file compression utilities) improve efficiency.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 37


Display Utilities
• Change the appearance of:
– Desktop
– Background
– Screen savers
– Window colors
•In Windows 7, the Personalization icon allows you to change
background themes, screen savers, and window colors.
•You can right-click the desktop and choose Personalize or use the
Control Panel.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 38


Add or Remove Programs
• Installation wizard
• Uninstall wizard
– Programs cannot simply be deleted
•When you install a new program, the program runs a wizard that
walks you through the installation process. If a wizard does not
initialize automatically, however, you should go to the Programs
and Features utility in the Control Panel. This prompts the OS to
look for the setup program of the new software and starts the
installation wizard.
•Some people think that deleting a program from the Program Files
folder on the C drive is the best way to remove a program from the
system. However, most programs include support files that are not
located in the main program folder. By selecting the Windows
uninstaller utility, Programs and Features, you delete the main
program file and all supporting files as well.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 39


File Compression Utilities
• Reduce the size of a file
• Take out redundancies
• Make it easier and faster to send files over the Internet, upload,
and save
• Generally, repeated patterns are replaced with a shorter
placeholder
The rain in Spain falls mainly on the plain.
•A file compression utility is a program that takes out redundancies in a file to
reduce the file size.
•File compression is helpful because it makes a large file more compact,
making it easier and faster to send over the Internet, upload to a Web page, or
save onto a disk.
•Windows has built-in compression (or zip) file support.
•There are also several stand-alone freeware and shareware programs, such
as WinZip (for Windows) and StuffIt (for Windows or Mac), that you can obtain
to compress your files.
•Most compression programs look for repeated patterns of letters and replace
them with a shorter placeholder.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 40


System Maintenance Utilities
• Disk Cleanup: Removes
unnecessary files
• Choose the files to be deleted
– Downloaded program files
– Temporary Internet files
– Offline Web pages
– Recycle Bin

•A set of maintenance utilities is built into Windows primarily for


system efficiency.
•Disk Cleanup cleans unnecessary files from your hard drive.
These include files that have accumulated in the Recycle Bin
as well as temporary files. If not deleted periodically, these
unnecessary files can affect a computer’s performance.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 41
System Maintenance Utilities
• Disk defragmenter: Regroups related pieces of files
• Error checker: Checks for lost files and fragments
• Task Manager: Checks on nonresponsive programs

•Disk defragmenter utilities regroup related pieces of files together on the


hard disk, allowing the OS to work more efficiently. Using the Windows
Disk Defragmenter Analyzer feature, users should check their hard drive
several times a year.
•Error checking, once known as ScanDisk, checks for lost files and
fragments as well as physical errors on your hard drive. Sometimes error
checking can recover the lost data, but more often, it deletes files that are
taking up space unnecessarily.
•If a program on your system stops working, you can use the Windows
Task Manager utility to check on the program or to exit the
nonresponding program.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 42


System Restore
• Restores system settings to a specific date
•Recent versions of
Windows have a
utility called System
Restore that lets you
restore your system
settings back to a
specific date when
everything was
working properly.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 43


System Backup
• Backup
– Creates a copy of the
hard drive to another
storage device
• Task Scheduler
– Runs selected utilities Task Scheduler
automatically
•When you use the Windows Backup and Restore utility, you create a
duplicate copy of all the data on your hard disk and copy it to another storage
device, such as a CD or an external hard drive.
•The Windows Task Scheduler utility allows you to schedule tasks to run
automatically at predetermined times, with no interaction necessary on your
part.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 44


Accessibility Utilities
• Ease of Access Center
– Centralized location
for assistive
technology
• High contrast
• Magnifier
• On-screen
keyboard
• Windows speech recognition

Windows Vista and Windows 7 have an Ease of Access Center, a


centralized location for assistive technology and tools that adjust
accessibility settings. In the Ease of Access Center, you can find tools
to help you adjust the contrast of or magnify the screen image, read
screen contents to you, or display an on-screen keyboard.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 45


Computer Skills For
Preparatory Programs
Chapter 5
Using the Internet:
Making the Most of the Web’s Resources

NOTE: The Internet has changed our world. Communications and commerce move
instantaneously across borders and around the world. Anyone can publish their
wares, ideas, or desires. Chapter 3 will present a brief introduction to the history of
the Internet, its tructure, and how it is used

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 1


Chapter Topics
NOTE:
• History of the Internet
• Forms of Internet
communication
• Web entertainment
• E-commerce
• Web browsers
• URLs
• Hyperlinks
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 2
Chapter Topics (cont.)
• Search engines
• Improving search
results
• Evaluating Web sites
• Connecting to the
Internet NOTE:

• Future of the Internet

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 3


History of the Internet
• Developed for secure military
communications
• Evolved from Advanced Research
Projects Agency Network (ARPANET)
• Funded by the U.S. government in the
1960s
• Enabled computers at leading universities
and research organizations to
communicate with each other
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 4
NOTE FOR HISTORY OF……
•Scientists were asked to come up with a solution to secure communications between large computer centers in case of
a nuclear attack. They responded by inventing packet switching and routers. By taking data messages and breaking
them into small packets, each packet could be addressed and sent individually to a destination through a series of
routers. The routers would send each packet along the optimum path to the next router, depending on traffic and
availability.
•The Internet is a network of networks that utilizes a common communication protocol so that computers from different
manufacturers can communicate.
•Today we can’t imagine life without the Internet.

•It is the way we communicate, shop, research, entertain, and


express ourselves.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 5


The Web vs. the Internet
• The Web is part of the Internet,
distinguished by
– Common communication protocols
– Hyperlinks
• 1989: Web invented by Tim Berners-Lee
• 1993: Mosaic browser released
• 1994: Netscape Navigator marked
beginning of the Web’s major growth

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 6


NOTE FOR THE WEB VS…..
• What distinguishes the Web from the rest of the
Internet is its use of:
• Common communication protocols enabling different
computers to talk to teach other and display information.
• Special links (called hyperlinks) enabling users to jump
from one place to another on the Web.
• The Web was invented long after the Internet, in 1989
by Tim Berners-Lee at CERN in Switzerland.
• In 1993, the National Center for Supercomputing
Applications (NCSA) released the Mosaic browser.
• Netscape Navigator heralded the beginning of the
Web’s monumental growth

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 7


Internet Communications
• E-mail
• Instant messaging
• Voice over Internet Protocol (VoIP)
• Group communication

NOTE:
Forms of

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 8


E-Mail
• Electronic mail
• Asynchronous communication
• Types of e-mail accounts
– Client-based
– Web-based
• Not private
– Can be printed or forwarded
– Employer can monitor

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 9


NOTE FOR E-MAIL
• E-mail is short for electronic mail and has quickly caught on as the primary
method of electronic communication because it’s fast and convenient and it
reduces postage and long-distance phone call expenses.
• With e-mail, the sender and receiver don’t have to be available at the same
time to communicate.
• Some e-mail accounts are client-based and use programs such as
Microsoft Outlook. Client-based systems are normally tied to a local
Internet service provider (ISP) and use that domain for an address.
If a user changes ISPs, his or her e-mail address changes.
• Web-based e-mail, on the other hand, finds the messages at a host
site received by and stored on a mail server and can be accessed
from anywhere. A Web-based e-mail address will stay the same no
matter what ISP is used. Free e-mail accounts such as Yahoo! or
Hotmail use Web-based e-mail clients.
• Be careful what you say in an e-mail message because it might come back
to haunt you

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 10


Instant Messaging
• Real-time, text-based conversations
• Personal and business uses
• List of contacts: buddy list
• IM software detects members’ presence
• Example: AOL Instant Messenger

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 11


NOTE FOR INSTANT
MESSAGING
• Instant messaging (IM) uses real-time text-based
conversations, similar to chat rooms.
• IM isn’t just for casual conversations between friends and
family, as more and more businesses are using it for
communications between co-workers.
• Users set up a list of contacts, often called a buddy list.
• IM software detects the presence of members who are online.
• Examples include:
• AOL Instant Messenger
• Yahoo! Messenger
• Windows Live Messenger
• Many of the popular IM services are proprietary, but universal
chat services are now available to allow users to
communicate no matter which service they use.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 12


Voice over Internet Protocol
• VoIP: Using the Internet to place phone
calls
• Uses technology similar to e-mail to send
voice data digitally
• Requires speakers, a microphone, an
Internet connection, and a VoIP provider
NOTE:

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 13


Voice over Internet Protocol
• VoIP services differ:
– Free services require an account on both
ends
– Paid services connect phone to computer
– Cable/DSL providers offer phone through
broadband
– Wi-Fi IP phones call through Internet hotspots
and wireless networks
NOTE: •VoIP services differ.
•Free services like Skype require an account on both
ends.
•Paid services like Vonage connect your regular phone to
your computer through a special adapter.
•Cable and DSL providers offer telephone service through
their existing broadband account.
•Wi-Fi IP phones allow calls through Internet hotspots and
wireless networks.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 14


Voice over Internet Protocol
Advantages Disadvantages
• Free or low cost • Lower sound quality
• Portability • Less reliability
• Convenience • Loss of service when
power is interrupted
• Security issues
NOTE: VoIP has become very popular due to its affordability, portability,
and convenience. However, it does have some disadvantages
compared to traditional phone lines:
•Sound quality varies based on available bandwidth.
•The very nature of Internet transmission can cause reliability
problems during a call.
•When the power (electricity) is out, service is lost and calls
cannot be placed.
•If proper security and encryption are not used in the
transmission process, calls can easily be monitored.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 15


Group Communication
• Chat rooms
• Newsgroups
• Listservs
• Blogs and vlogs
• Wikis NOTE:
• Podcasts and There are many ways you can interact with a wide variety of people
online:
•Chat rooms
webcasts •Newsgroups
•Listservs

• Social networks •Blogs and vlogs


•Wikis
•Podcasts and webcasts
•Social networks

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 16


Chat Rooms
• Real-time, text-based conversations
• Rooms can focus on specific topics or
interests or be general interest
• Identity protection
– Username can allow anonymous interaction
• Netiquette: rules of polite interaction
NOTE: •A chat room is an area on the Web where many people come
together to communicate online. The conversations are in real
time and are visible to everyone in the chat room.
•Chat rooms are sometimes theme oriented and sometimes not.
•There is no chance for editing out outlandish or offensive
opinions or language.
•People in chat rooms choose an identity and therefore are
anonymous.
•General rules of etiquette (netiquette) include introducing
yourself when you enter the room; specifically addressing the
person you are talking to; and refraining from swearing, name
calling, and using explicit or prejudiced language. Users cannot
repeatedly post the same text and should not type in all capital
letters
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 17
Newsgroups and Listservs
• Newsgroups
– Online discussion forums
– Members post and reply to messages
– Create or respond to “threads”
• Listservs
– Electronic mailing lists of people interested in a
topic
– Threads are sent as e-mails
– Less public than newsgroups
•Newsgroups are sometimes called threaded discussions or
NOTE: discussion groups. Built around topics or interests, participants
read entries from other participants and respond, with each
respondent adding something new to the discussion, creating a
thread. A participant can also start a new thread. Unlike chat
rooms, threaded discussions don’t rely on instant responses, but
on a more thought-out written response. In distance education
classes, threaded discussions are often required and serve as
the class participation component of a course.
•Listservs are similar to newsgroups except that the threads are
sent out as e-mails, with each participant in the thread receiving
each new posting. They are less public than newsgroups.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 18
• Web interactions
Web 2.0
between people,
software, and data
• Social web where
the user is also a
participant
• New applications
that combine the
functions of multiple
NOTE:
•Use of the Web has evolved to emphasize online sharing and
applications collaboration.
•Web 2.0 is a new wave of Web interactions between people,
software, and data. It is classified as the social Web in which the
user is also a participant. Additionally, Web 2.0 describes a trend
of new applications that combine the functionality of multiple
applications.
•Examples include blogs, wikis, podcasts, and social networking
sites.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 19


Blogs and Vlogs
• Personal journals posted on the Web
• Weblogs: blogs
– Primarily text-based
– Simple to create, read, and manage
– Entries listed on a single page, with most recent
entry at the top
– Searchable
• Video logs: vlogs
– Digital video clips playable on media player software
•Weblogs, or blogs, are a way for anyone to post their thoughts

NOTE: for public viewing. They are personal logs, or journal entries,
posted on the Web.
•The beauty of blogs is that they are simple to create, manage,
and read. Traditionally blogs are text-based and are written by
one author, arranged as a listing of entries on a single page, with
the most recent entry located at the top of the list.
•Blogging is easy and free. Many blogs are personal logs but
some focus on specific topics. Blogs are public and their content
is searchable.
•Video logs, or vlogs, are personal journals that use video as the
main form of expression. You can play vlogs on your personal
computer and mobile devices.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 20
Wikis
• Wikis: Web sites that allow anyone to
change their content
– Provide a source for collaborative writing
– Eliminate exchanging e-mails
– Track revisions

NOTE:
•A wiki is a type of Web site that allows anyone visiting the site to
change its content by adding, removing, or editing the content.
•Wikis provide an excellent source for collaborative writing by
eliminating the need to send e-mails back and forth.
•A history of all changes is kept so a previous version can be
easily accessed if desired.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 21


Podcasts
• Podcasts: Compressed audio or video files distributed
on the Internet
• Really Simple Syndication (RSS) technology allows
constant updates for subscribers
• Podcasts are all over the Web
– Need “aggregator” software to gather podcasts
– Need media player software to play them
• Simple to create

NOTE: •Podcasts use compressed audio and video files to distribute


content on the Internet using RSS technology.
•Really Simple Syndication (RSS) technology allows for constant,
automatic updates of Web pages.
•Podcasts are found all over the Web.
•They require aggregator software to gather the podcasts and
media player software to listen to them.
•Podcast creation is an easy process

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 22


Webcasts
• Webcasts: Broadcasts of audio or video
content over the Internet
– Often live
– Delivered to your computer
– Use streaming media

NOTE:
•Webcasts are broadcasts of mostly live audio or video files on
the Internet.
•Webcasts use streaming media technology to deliver content to
many simultaneous viewers

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 23


Social Networks
• Online personal and business networks
– Examples include Facebook , MySpace, and
LinkedIn
• Members share common interests
• Members communicate by voice, chat, IM,
videoconference, and blogs
• Growth has been explosive

NOTE: •Social networking sites like Facebook, MySpace, and LinkedIn


have become immensely popular.
•These sites are easy places for members to hang out, meet new
people, and share common interests.
•They provide a way for members to communicate with their
friends and business associates by voice, chat, IM,
videoconference, and blogs.
•Growth of participation in these sites has been explosive.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 24


Online Storage and Backup
• Anytime, anywhere access via Internet
• Preserves and protects valuable files
• Examples:
– Carbonite Online PCBackup
– Idrive
– MozyHome Online Backup

NOTE: •Online storage is an alternative to portable storage devices such


as flash drives and external hard drives. Your data can be
accessed anywhere that Internet access is available.
•You can back up sensitive or essential files as well. Your
information is stored online in a secure, remote location so it is
less vulnerable to potential disasters.
•Some services offer free, limited online storage. Others offer
unlimited space for a fee.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 25


Web Entertainment
• Multimedia
– Involves forms of media and text
• Graphics
• Audio
• Video
– Streaming audio and video
• Games
– Multiplayer online games
– Interact with other players
•Multimedia is anything that involves one or more forms of media

NOTE: in addition to text.


•All kinds of multimedia are available on the Web. You can
download music files, video files, and even movies.
•Streaming audio and video can deliver on-demand pictures and
sounds. Sites like CNN.com offer clips from their broadcasts.
•Some files require a plug-in program like RealPlayer. In recent
versions of Windows, Microsoft’s MediaPlayer is built in and
automatically loads when a music file is selected.
•There are many multiplayer online games in which play occurs
among hundreds or thousands of other players over the Internet.
•You can interact with other players around the world in a
meaningful context by trading, chatting, or playing cooperative or
combative mini-games.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 26
E-Commerce
• E-Commerce: conducting business online
– Business-to-consumer (B2C)
– Business-to-business (B2B)
– Consumer-to-consumer (C2C)

NOTE: •E-commerce grows in importance every day, with billions of


dollars worth of transactions.
•In business-to-consumer or B2C transactions, such as
Amazon.com, the end buyer purchases goods or services over
the Internet.
•In business-to-business or B2B transactions, businesses sell to
one another.
•In consumer-to-consumer or C2C transactions, like ebay.com,
consumers sell to one another.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 27


Secure Web Sites
• Display:
– VeriSign seal
– Closed padlock or
key icon
• URL changes from
http:// to https://

NOTE: •Businesses hire security companies such as VeriSign to certify


that their online transactions are secure. Thus, if a Web site
displays the VeriSign seal, you can usually trust that the
information you submit to the site is protected.
•Another indication that a Web site is secure is the appearance in
your browser of a small icon of a closed padlock (Internet
Explorer) or key (Netscape).
•Additionally, the beginning of the URL of the site changes from
http:// to https://, the s standing for “secure.”

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 28


Online Shopping Guidelines
• Shop at well-known, reputable sites
• Pay by credit card, not debit card
• Check the return policy

NOTE: To shop safely online, follow these guidelines:


•Shopping at well-known, reputable sites helps ensure a safe
shopping experience. If you are not familiar with a site, check it
out with the Better Business Bureau, and also make sure that the
company has a phone number and street address before
ordering.
•Debit cards do not have the same level of protection as credit
cards under U.S. federal consumer credit card protection laws.
Use a card with a small limit, or consider using a prepaid credit
card.
•Check and print out the return policy. You might need it when
filing a complaint to prove what the policy showed at the time of
your order. Web sites can be changed easily and rapidly and can
also be shut down overnight.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 29



Web
Computer software
Browsers
• Graphical
• Enables Web navigation
• Popular browsers:
– Microsoft Internet Explorer
– Mozilla Firefox
– Apple Safari
– Google Chrome

NOTE: •A Web browser is software installed on your computer system


that allows you to locate, view, and navigate the Web.
•Web browsers are graphical, meaning they can display pictures
(graphics) in addition to text, as well as other forms of
multimedia, such as sound and video.
•Although Microsoft Internet Explorer is the most used Web
browser, there are other browsers available, such as Mozilla
Firefox and Google Chrome. Because Microsoft products are the
main targets for virus writers, an alternative browser might be
less vulnerable

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 30


Browser Features
• Quick tabs: Show thumbnail images of
all open Web pages in open tabs
• Tabbed browsing: Multiple pages
available in the same browser window
• Built-in search engine(s)

NOTE:
•Internet Explorer 7 has a much more streamlined approach than its
predecessors. The browser’s toolbars provide convenient navigation
and Web page management tools.
•Quick tabs show thumbnail images of all open Web pages in open
tabs.
•With tabbed browsing, Web pages are loaded in “tabs” within
the same browser window. Rather than having to switch between
Web pages on several open windows, you can flip between the
tabs in one window.
•The browser also includes a built-in search box in which you can
designate your preferred default search engine.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 31


URLs
• URL:
– Uniform Resource
Locator
– Unique Web site
address

•A URL is a Web site’s address. It is composed of several parts


NOTE: that help identify the Web document it stands for.
•The first part of the URL indicates the set of rules (or the
protocol) used to retrieve the specified document. HTTP is most
common. Another popular protocol is FTP.
•The protocol is generally followed by a colon, two forward
slashes, www (indicating World Wide Web), and then the domain
name. The domain name is also referred to as the host name.
• At times, a forward slash and additional text follow the domain
name. The information after the slash indicates a particular file or
path (or subdirectory) within the Web site.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 32


Top-Level Domains
Domain Name Who Can Use the Domain Name
.biz Businesses
.com Originally for commercial sites but can be used by anyone now
.edu Degree-granting institutions
.gov United States government
.info Information service providers
Limited to organizations, offices, and programs that are
.int
sanctioned by a treaty between two or more nations
.mil United States military
.name Individuals
.net Originally for networking organizations but no longer restricted
.org Organizations (often nonprofits)
•The three-letter suffix in the domain name (such as .com or

NOTE: .edu) is called the top-level domain. This suffix indicates the kind
of organization the host is.
•The most used is the .com or commercial domain, which can be
used by anyone.
•There are also domains for countries outside the United States.
For instance, a Web site in Germany has the extension .de, and
in Italy it is .it.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 33


Hyperlinks

•Once you’ve reached a Web site, you can jump from one Web

NOTE: page to another within the Web site or to another Web site
altogether by clicking on specially coded text called hyperlinks .
•Generally, text that operates as a hyperlink appears in a
different color (often blue) or is underlined. Sometimes images
also act as hyperlinks.
•When you pass your cursor over a hyperlink, the pointer turns
from an arrow into a hand with the index finger pointing.
•To retrace your steps, some sites also provide a breadcrumb list—a list
of pages within a Web site you’ve visited that usually appears at the top
of a page. Additionally, the history list in your browser keeps track of
where you’ve visited, organized by date.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 34


Favorites and Bookmarks
• Allow you to return to Web pages
– Favorites (Internet Explorer and Safari)
– Bookmarks (Firefox and Google Chrome)
• Stay up to date
– Live bookmarks (Firefox)
• Organize and share
– Social bookmarking sites

•While browsing the Web, you might want to remember a site for

NOTE: future reference. Using the Favorites or Bookmark feature, you


can store the site’s URL in a special folder on the hard drive of
your computer.
•Firefox offers live bookmarks, which adds the technology of
RSS feeds to bookmarking, allowing updates to be delivered to
you as soon as they are available.
•Social bookmarking sites such as delicious.com and digg.com
allow you to tag and organize Web sites and news content using
your own keywords and share them with others.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 35


Popular Search Sites
AltaVista www.altavista.com Keyword search engine
Keyword search engine that groups similar results into
Clusty www.clusty.com
clusters
Don’t like your search results? This site lets you chat
ChaCha www.chacha.com with a real live professional guide who helps you
search, and it’s free of charge.
Deep Web directory that searches databases not
Complete-Planet www.completeplanet.com
normally searched by typical search engines
Metasearch engine that searches Google, Yahoo!, MSN
Dogpile www.dogpile.com
Search, and Ask
Excite www.excite.com Portal with keyword search capabilities
Subject directory of academic resources with keyword
InfoMine www.infomine.com
search engine capabilities
Short for Roll Your Own Search Engine. Basically, this
Rollyo www.rollyo.com site lets you create your own search engine (searchroll)
that searches just the sites you want it to search.
Open Directory
www.dmoz.org Subject directory with keyword search capabilities
Project
Lets you rate pages thumbs up or thumbs down. As it
Stumbleupon www.stumbleupon.com
learns your preferences, your search results improve.
Technorati www.technorati.com A great search engine for blog content

NOTE •You can search the Web using a search engine or a subject directory.
•A search engine is a set of programs that searches the Web for specific keywords you wish to query and
then returns a list of the Web sites on which those keywords are found.
•A subject directory is a guide to the Internet organized by topics and subtopics.
•The list on this slide gives alternatives to sites such as Google, Yahoo!, and Ask.com.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 36
Search Engines
• User keys word or phrase into search box
• Spider or Web crawler program scans Web
pages
• Results are indexed and sent to the client
• Different engines produce different hit lists
• Multimedia search functionality is also
available
•Search engines have three parts. The first part is a program

NOTE: called a spider, which collects data on the Web.


•The second part is an indexer program that organizes the data
into a large database.
•The third part is the search engine software, which searches the
indexed data, pulling out relevant information according to your
search.
•You won’t get the same results from each search engine as
proprietary algorithms are used and the sites they search differ.
•You can search for digital images and audio and video files, too.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 37


Improve Search Results
• Place quotation marks around keywords
• Search within a specific Web site
• Enter wildcard symbols
• Use the advanced search form

•To narrow search results to a list of relevant sites you can search for

NOTE: exact phrases by putting quotation marks around keywords so the


search engine returns sites where the words are contained in that exact
order.
•You can search just a specific Web site by typing in your keyword
followed by “site:” and then the site’s URL.
•Wildcards are symbols used to replace a series of letters. The asterisk
(*) is helpful when you’re searching for a keyword but are unsure of its
spelling, or if a word can be spelled in different ways or contain
different endings. Some search engines let you use a question mark (?)
or percent sign (%) to replace a single letter in a word.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 38


What Can You Borrow
from the Web?
• Avoid:
– Plagiarism: Representing someone else’s ideas or
words as your own.
– Copyright violation: Using another person’s material
for your own economic gain
• Properly credit information you quote or
paraphrase
• Obtain written permission from copyright holder
•You cannot borrow information you obtain from the Internet including words,

NOTE: ideas, graphics, data, and audio and video clips. This could be construed as
plagiarism. Use quotation marks around all words you borrow directly and credit
your sources for any ideas you paraphrase or borrow.
•Copyright law assumes all original work (including online work) is copyrighted
even if it does not display the copyright symbol. Copyright violation is
punishable by law. You need to seek and receive permission from the copyright
holder if you are using the other person’s material for your own personal
economic benefit, or if you are taking away from the economic benefit of the
originator. Work in the public domain is an exception to this rule.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 39


Evaluating Web Sites
• Who is the author of the article or Web site
sponsor?
• Is the site biased?
• Is the information current?
• Toward what audience is the site geared?
• Are links available?
Evaluating the content of a Web site is important. Before you believe what the
site says or take action based on the information presented, several questions

NOTE: need to be answered.


•Who exactly owns and operates the Web site?
•Are the opinions expressed on the site objective, or are they slanted toward
one position or another? If it is slanted, why is it slanted?
•Is the information up to date? How often is the site updated?
•Who is the site trying to reach with its message?
•Do the hyperlinks all work, or are some dead ends? Are the links appropriate?
•Like anything else, how well maintained a site is helps determine its
believability

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 40


Internet Clients and Servers
• The Internet is a client/server network
• Client computer:
– Users connected to the Internet
– Requests data and Web pages
• Server computer:
– Stores Web pages and data
– Returns the requested data to the client
• Internet backbone
• IP addresses

•The Internet is a huge client/server network. Thus, a computer connected to

NOTE: the Internet acts in one of two ways: It is either a client, a computer that asks
for data, or a server, a computer that receives the request and returns the
data to the client.
• Data travels between clients and servers along pathways, the largest of
which is called the Internet backbone.
•Internet Protocol (IP) addresses are the means by which all computers connected to
the Internet identify each other.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 41


Connecting to the Internet
• Dial-up connections
• Broadband connections
– DSL
– Cable
– FiOS
– Satellite

NOTE: •To take advantage of the resources the Internet offers, you need a means to connect
your computer to it. Home users have several connection options.
•Originally, the only means to connect to the Internet was with a dial-up connection
where you connect to the Internet using a standard telephone line.
•However, other connection options, collectively called broadband connections,
offer faster means to connect to the Internet. Broadband connections include DSL,
cable, and satellite. A recent broadband service available for home use is fiber-optic
service (FiOS).

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 42


Broadband Connections
• Cable
– Uses coaxial cable and a cable modem
– Fast connection speed
– Speed depends on number of users
– Not available in all areas

NOTE:
•One type of broadband connection is cable Internet.
•Cable Internet uses coaxial cable and a cable modem.
•This always-on connection can be slowed by the number of
users connected at any one time, and it is not available in all
areas.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 43


Broadband Connections
• Digital subscriber line
(DSL)
– Uses telephone lines
– Faster than dial-up
– Doesn’t tie up phone
line
– Requires special DSL
modem
– Not available in all areas

NOTE: •DSL uses a standard phone line to connect to the Internet.


However, the line is split between digital and voice, meaning that
the digital signal does not have to be converted into sounds, and
greater speeds can be realized.
•Although the monthly fee is higher than that for dial-up, there is
no need for a second phone line.
•DSL requires a special DSL modem.
•Not all areas of the United States have DSL. Also, to use DSL,
your telephone connection must be within fairly close proximity of
a switching station

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 44


Broadband Connections
• Fiber-optic service (FiOS)
– Sends light through fiber optic lines
– Faster than cable or DSL
– Expensive
– Available only in certain areas

•Fiber-optic Internet transmits data by sending light through optical


NOTE: fibers. Because light travels so quickly, this technology can bring an
enormous amount of data to your home at superfast speeds. When the
data reaches your house, it’s converted to electrical pulses that transmit
digital signals your computer can read.
•The biggest advantage to fiber-optic Internet is its speed.
•Cost might be the main disadvantage.
•Also, because fiber-optic lines must be laid before service is available,
the service is available only in select areas.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 45


Broadband Connections
• Satellite
– Uses satellite dish and coaxial cable
– Slower than cable or DSL
– Expensive

•When other high-speed options are not available, satellite Internet is


NOTE: an option.
•A two-way satellite Internet connection is always on and is faster than
dial-up; however, there is a difference between the upstream and
downstream speeds

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 46


Wireless Access
• Increases mobility and productivity
• Requires a Wi-Fi hotspot
• Requires either internal or external
wireless access card for device
• Aircards provide wireless access
through mobile devices when a Wi-
Fi hotspot is not available

NOTE: •Connecting wirelessly increases mobility and productivity, as the


user can access networks and resources from more locations
without having to have a wired connection.
•To connect wirelessly, a Wi-Fi (wireless fidelity) hotspot must be
within range and the device (i.e., notebook, PDA, or cell phone)
must have either an internal or an external Wi-Fi access card.
•Another expensive option available that’s usually used when a
Wi-Fi hotspot is not in range is an aircard. Aircards provide
access through cell phone towers and generally require a
separate service plan.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 47


Dial-Up Connections
• Use standard telephone line
• Tie up phone line
• Require a modem to convert analog and
digital signals
• Slowest connection speed (56 Kbps)
• Lowest cost

NOTE: •A dial-up connection needs only a standard phone line and a


modem. A dial-up modem is a device that converts (modulates)
the digital signals the computer understands to the analog
signals that can travel over phone lines. In turn, the computer on
the other end must also have a modem to translate (demodulate)
the received analog signal back to a digital signal for the
receiving computer to understand.
•Modern desktop computers generally come with internal
modems. Notebooks use either internal modems or PC cards
that are inserted into a special slot on the notebook.
•Current modems have a maximum data transfer rate that is
generally five times slower than a broadband connection.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 48


Comparing Internet
Connection Options

NOTE: Internet connection costs vary widely, as does performance. One


factor to consider in choosing the right Internet connection is speed.
The data transfer rate, also informally referred to as the connection
speed, is the measurement of how fast data travels between computers.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 49


Future of the Internet
• Large scale networking (LSN)
– Research and development of cutting-edge
networking and wireless technologies
• Internet2
– Project sponsored by universities, government,
and industry to develop new Internet
technologies
– Internet2 backbone supports transmission
speeds of 9.6 Gbps
The Internet will continue to have great influence in the future.

NOTE: Greater bandwidth; wireless access; and the amalgamation of


telephone, TV, and Internet technologies will bring change and
spur new, unforeseen developments.
•The U.S. government sponsors research called the large scale
networking (LSN) program, which funds cutting-edge research in
wireless and networking technologies.
•Another major effort is Internet2, a cooperative research project
of over 200 universities with government and industry partners. A
major thrust of their research is increased bandwidth for the
whole Internet.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 50
Future of the Internet
• Internet entrenched in daily life
• Web-based services for personal and
professional interactions
• Internet-enabled appliances and systems

NOTE: •The future Internet will assist us with day-to-day activities and
tasks. The Internet is already integral to the way we
communicate, shop, research, entertain, and express ourselves.
With increasing wireless accessibility, we will become even more
dependent on the Internet.
•More Web-based applications will continue to evolve.
•Internet-enabled appliances and household systems will
become more affordable and will allow your home to run itself.
For example, your refrigerator will monitor its contents and
restock by placing online orders

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 51


Computer Skills For Preparatory
Programs
Chapter 6
Networking:
Connecting Computing Devices
Notes:
Networks can increase the usefulness of computers. In this chapter, we’ll
discuss networks, including home networks that share an Internet
connection. Because networks are vulnerable to intrusion, we’ll also
discuss computer threats—both what they are and how to prevent them.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 1


Chapter Topics
• Networking fundamentals
• Network architecture
• Network components Notes :
• Peer-to-peer networks Topics in Chapter 7
include:
• Ethernet networks Networking fundamentals
Network architecture
• Power-line networks Network components
Peer-to-peer networks
• Configuring software Ethernet networks
Power-line networks
• Wireless security Configuring software
Wireless security
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 2
Networking Fundamentals
• Computer network
– Two or more computers connected together
– Devices connected to networks: nodes
• Benefits of a network
– Sharing resources and peripherals
– Transferring files
– Sharing of broadband connection with use of a router
Notes :
•A computer network is simply two or more computers connected together via software and hardware so they
can communicate.
•Devices connected to a network are referred to as nodes. A node can be a computer, a peripheral (such as a
printer), a game console (such as an Xbox 360), a digital video recorder (such as a TiVo), or a
communications device (such as a modem).
• The main function for most networks is to facilitate information sharing, but networks provide other
benefits as well.
•They allow users to share peripherals.
•Files can be transferred from one computer to another without using external storage media.
•Shared folders can allow access to stored files on one computer to other networked computers.
•If you install a device called a router on your network, you can share broadband Internet
connections.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 3


Network Architecture
• Network designs
– Locally administered
• Peer-to-peer (P2P)
– Centrally administered
• Client/server

Notes :
There are two main ways a network can be administered (or run):
locally or centrally. A peer-to-peer network is the most common
example of a locally administered network. The most common type
of centrally administered network is a client/server network.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 4


Peer-to-Peer Networks
• Nodes communicate with each other
Notes :
– Peers •In peer-to-peer (P2P) networks, each node
connected to the network can communicate
• Share peripheral devices directly with every other node on the
• Common in home networks network, rather than having a separate
device control the network centrally.
•Thus, all nodes on this type of network are
in a sense peers (or equals).
•When printing, for example, a computer on
a P2P network doesn’t have to go through
the computer that’s connected to the printer.
Instead, it can communicate directly with the
printer.
•Because they are simple to set up, P2P
networks are the most common type of
home network.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 5


Client/Server Networks
Notes :
• Client computers
•Most networks that have 10 or more nodes are
– Users who make requests client/server networks.
• Server computers •A client/server network contains two types of
computers: clients and servers.
– Provide resources to clients •The client is the computer on which users
– Central network control accomplish specific tasks and make specific
requests.
• Internet •The server is the computer that provides
information or resources to the client
– A large, multiserver, computers on the network.
multiclient network •The server on a client/server network also provides
central control for functions on the network
(such as printing).
•The Internet is a client/server network. When your
computer is connected to the Internet, it is
functioning as a client computer. When connecting
to the Internet through an ISP, your computer
connects to a server computer maintained by the
ISP. The server “serves up” resources to your
computer so that you can interact with the Internet.
•Home server options, such as Windows Home
Server or Hewlett Packard’s MediaSmart servers,
are now being marketed as the use of media files
on home computers expands rapidly

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 6


HANs and LANs
• Home area network (HAN)
– Connects digital devices within a home
• Local area network (LAN)
– Nodes are within a small geographic region
• Schools
• Small businesses
Notes :
•The distance between nodes on a network is another way to describe a
network.
•Home area networks (HANs) are networks located in a home that are used to connect
digital devices such as computers, peripherals, phones, cameras, digital video recorders
(DVRs), and televisions.
•Local area networks (LANs) are networks in which the nodes are located within a
small geographic area. A network in a computer lab at school is an example of a
LAN.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 7


WANs and MANs
• Wide area network (WAN)
– LANs connected over long distances
• A few miles to thousands of miles
• Uses telecommunications lines
• Metropolitan area network (MAN)
– Provides access within a specific geographic region, such as a city
Notes :
•Wide area networks (WANs) are made up of LANs connected over long
distances. Say a school has two campuses located in different towns.
Connecting the LAN at one campus to the LAN at the other campus (by
telecommunications lines) allows users on the two LANs to communicate with
each other. The two LANs would be described as a single WAN.
•Metropolitan area networks (MANs) are designed to provide access to an

entire city .
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 8
Network Components
• Transmission media Notes :
• Network communication devices
To function, all networks must
• Software include:
1. a means of connecting the
nodes to the network (by
cables or wireless technology)
2. special devices that allow the
nodes to communicate with
each other and to send data
3. software that allows the
network to run.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 9


Transmission Media
• Provide communications channel between nodes
• Forms of media
– Twisted pair cable
– Coaxial cable
– Fiber-optic cable
– Radio waves (wireless)
• Bandwidth
– Data transfer rate
– Throughput
Notes :
•All network nodes are connected to each other and to the network by transmission media. A
transmission medium establishes a communications channel between the nodes on a network and
can take several forms.
• Networks can use existing wiring (such as phone lines or power lines) to connect nodes.
• They can use additional cable (such as twisted pair cable, coaxial cable, or fiber-optic cable)
to connect nodes.
• Wireless networks use radio waves instead of wires or cable to connect nodes.
•The data transfer rate (also called bandwidth) is the maximum speed at which data can be transmitted
between two nodes on a network.
•Throughput is the actual speed of data transfer that is achieved; this is usually less than the data
transfer rate.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 10


Network Adapters
• Devices connected to or installed in nodes Notes :
– Network interface cards (NICs)
– External or internal network adapters •Network adapters are devices
• Enable communication between nodes connected to or installed in
network nodes that enable the
nodes to communicate with
each other and to access the
network.
•Other network adapters are
installed inside computers and
peripherals as expansion cards.
These adapters are referred to
as network interface cards (NICs).
•Some network adapters take
the form of external devices that
plug into an available USB port.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 11
Network Navigation Devices
• Devices that help make data flow possible
• Routers
– Route data between networks
• Switches
– Receive data and retransmit it to nodes on the same network
Notes :
•Data is sent over transmission media in bundles called packets. For computers to
communicate, these packets of data must be able to flow between computers. Network
navigation devices help make this data flow possible.
•In simple networks, navigation devices are built right into network adapters. More
sophisticated networks need specialized navigation devices.
•The two most common specialized navigation devices are routers and switches.
-Routers transfer packets of data between two or more networks. For example, if a
home network is connected to the Internet, a router is required to send data
between the two networks.
-Switches receive data packets and send them to the node for which they are
intended on the same network (not between different networks).
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 12
Networking Software
• Peer-to-peer software
– Built into operating systems that support networking
• Windows
• Mac OS
• Linux

Notes :
Home networks need OS software that supports peer-to-peer
networking. The most common versions of Windows used in the
home support P2P networking. You can connect computers running
any of these OSs to the same network. The last several versions of
the Mac OS and the various versions of Linux also support P2P
networking.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 13


Networking Software
• Client/server software
– Network operating system (NOS) software
• Windows Server 2008
• SUSE Linux Enterprise
Notes :

Client/server networks are controlled by a central server that has


specialized network operating system (NOS) software installed on it. This
software handles requests for information, Internet access, and the
use of peripherals for the rest of the network nodes. Examples of NOS
software are Windows Server 2008 and SUSE Linux Enterprise.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 14


Types of Peer-to-Peer Networks
• Wired Ethernet networks
• Wireless Ethernet networks
• Power-line networks
Notes :

• There are three main types of P2P networks:


• Wired Ethernet networks
• Wireless Ethernet networks
• Power-line networks
• The major difference among these networks is the transmission media
by which the nodes are connected and the bandwidth each achieves.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 15


Wired Ethernet Networks
Notes :

• Ethernet network adapters are used to •Ethernet networks use the Ethernet protocol as the means
by which the nodes on the network communicate.
connect nodes •An Ethernet network requires that you install or attach
– NIC card network adapters to each computer or peripheral you want
to connect to the network. Most computers come with
– ExpressCard Ethernet adapters preinstalled as network interface cards
– USB adapter (NICs).
•If your computer doesn’t have a NIC, you can buy one and
• Computers are connected to each other install it, or you can use a USB adapter, which you plug
into any open USB port on the system unit.
using unshielded twisted pair cable •Although you can use USB versions in laptops,
ExpressCard versions of Ethernet NICs are made
especially for laptops.
•The most popular transmission medium for wired Ethernet
networks is unshielded twisted pair (UTP) cable. Used in
telephone lines, it is composed of four pairs of wires that
are twisted around each other to reduce electrical
interference.
•UTP cable for Ethernet comes as Cat 5E, Cat 6, and Cat
7. Cat 5E has a bandwidth of up to 1,000 Mbps, and Cat 6
over 1 Gbps. Cat 7 cable is designed for Ultra Fast
Ethernet
Phone Ethernet networks, which run at speeds of up to 10 Gbps. It
is generally not used in home networks. However, if the
cost of installing Cat 7 cable is not significantly more than
installing Cat 6 cable, you might want to consider using it
as a hedge against needing higher bandwidth for future
networking applications.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 16


Ethernet Switches
Notes :
• Keep track of data packets
•Data is transmitted through the wires
• Amplify and retransmit signals of an Ethernet network in packets.
• Keep the network running efficiently Data packets can suffer collisions. If
data packets collide, the data in them
is damaged or lost. In either case, the
network doesn’t function efficiently.
•A switch in an Ethernet network acts
like a traffic signal by enforcing the
rules of the data road on the
transmission media. The switch keeps
track of the data packets and, in
conjunction with NICs, helps the data
packets find their destinations without
running into each other.
•Home networks often use four or eight
port switches that can accommodate
four or eight devices, respectively.
Switches can be chained together if
more ports are needed for the home
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
network
17
Ethernet Routers
• Transfer packets from one network to another
• Home Internet routers transfer data from the Internet to
the home network
Notes :
• Allows for network-ready devices such as network
printers or network •Routers are devices that transfer packets of data
attached storage (NAS) between two or more networks. If a home
network is connected to the Internet, you need a
router to send data between the home network
and the Internet.
•Because so many people are sharing Internet
access in home networks, manufacturers are
making devices that combine switches and
routers and are specifically designed to connect
to DSL or cable modems. These are often
referred to as DSL/cable routers.
•Other network-ready devices, such as network
printers or network attached storage (NAS), can
be attached directly to a router, allowing access
by all computers on the network. This allows
these devices to be accessed directly instead of
going through another computer, such as
happens with shared devices on a P2P network.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 18
Wireless Ethernet Networks
• Ethernet networks that use radio waves instead of wires to connect nodes
• Based on the IEEE 802.11 standard, also known as Wi-Fi
• Each node requires a wireless network adapter
– Transceivers

Notes :

•A wireless network uses radio waves instead of wires or cables as its transmission
media.
•Current wireless Ethernet networks in the United States are based on the 802.11
standard, which is also known as Wi-Fi.
•Just as with other networks, each node on a wireless network requires a network
adapter. Wireless network adapters are available as NICs that are inserted into
expansion slots on the computer or as USB devices that plug into an open USB port.
•Wireless network adapters differ from other network adapters in that they contain
transceivers. A transceiver is a device that translates the electronic data that needs to
be sent along the network into radio waves and then broadcasts these radio waves to
other network nodes. Transceivers also receive signals from other network nodes.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 19


Wireless Access Point (WAP)
• Device added to a wireless network to extend the range of the network
• Must connect to either a switch, a router, or a node on the network

Notes :

A wireless access point (WAP) is a device added to a network to


extend the range of the wireless network by providing a second point
at which nodes can connect to the network. It must connect directly to
either a switch, a router, or a node on the network.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 20


Power-Line Networks
• Computers are connected to a house’s electrical wiring
to create a network
Notes :
• A power-line network adapter connects nodes to •Power-line networks use the existing electrical wiring
electrical outlets
in your home to connect the nodes in the network.
•In a power-line network, any electrical outlet
provides the network connection. The original power-
line networks had a maximum data transfer rate of
14 Mbps. New standards provide for data transfer
rates approaching 200 Mbps.
•To create a power-line network, you connect a
power-line network adapter to each computer or
peripheral attached to the network. You plug the
adapters into an electrical outlet. Most power-line
network adapters are automatically recognized by
the Windows operating system.
•The original power-line networks were not popular.
However, the higher data throughput of today’s
power-line networks is bringing the idea back into
focus. Also, power-line networks can sometimes
exceed speeds of wireless Ethernet networks, and
can be especially useful where there is a lot of
interference on the wireless network.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 21


Choosing a Peer-to-Peer Network
• Things to consider
- Whether existing wiring is available
- Whether you want wireless communications
- How fast you want your network connection to be
- How much money you can spend on your network

Comparing the Major Types of Home Networks


Wired Power- Wireles Wireles
Ethernet Line s s
802.11 802.11n
g
Maximum data transfer 100 Mbps 200 54 540
rate to Mbps Mb Mbp
(bandwidth) 1 Gbps ps s
Relative installation and $ $$ $ $$
equipment costs for
networking
two computers

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 22


Notes :
. ‫مالحظه للصفحه القبل‬
• If you’re setting up a home network, the type of network you should
choose depends on your particular needs. In general, consider the
following factors in determining your network type:
•Whether existing wiring is available
• Whether you want wireless communications
• How fast you want your network connection to be
• How much money you can spend on your network

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 23


Configuring Software
for Your Home Network
• Windows Vista and later versions
– Use wizards launched from Network and Sharing Center in Control Panel
• Before running wizards:
1. Install network adapters on each node.
2. For a wired network, plug all the cables into the router, network adapters, and so
on.
Notes :
•Once you install the hardware for your network, you need to configure your
operating system software for networking on your computers.
•Windows Vista (and later versions) makes configuring software relatively simple
by providing the Network Setup Wizard for setting up wired networks. For
wireless networks, Windows provides the Wireless Network Setup Wizard. You
can launch both of these wizards from the Network Sharing Center in the Control
Panel. Before running these wizards, you should do the following:
1. Install network adapters on each node.
2. For a wired network, plug all the cables into the router, network adapters,
and so on.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 24
Configuring Software
for Your Home Network
3. Make sure your cable/DSL modem is connected to your router and the Internet.
4. Turn on your equipment in the following order:
a. Cable/DSL modem
b. Router
c. All computers and peripherals (printers, scanners, and so on)

Notes :

3. Make sure your cable/DSL modem is connected to your router and the
Internet.
4. Turn on all equipment in this order, allowing time for each to power up and
configure before starting the next device:
• Your cable/DSL modem
• Your router
• All computers and peripherals (printers, scanners, and so on)
•Completing these steps enables the wizards to make decisions about how best
to configure your network

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 25


Networking Multiple Versions
of Windows
• Set up Windows 7 and Vista machines first
– Automatically detect other computers running Windows on network
– Windows XP will need adjustment to see other versions of Windows
• Give each Windows computer a unique name
• Place all computers in the same workgroup
Notes :

•Windows 7, Windows Vista , and Windows XP are the most common OSs for home use that support
P2P networking. Fortunately, you can network computers using any of these versions of Windows.
•If you have one computer with Windows 7 but your other computers run on other versions of Windows,
then you should set up your Windows 7 computer first. Windows 7 and Windows Vista can
automatically detect computers running other versions of Windows on your network; however, you
might have to make adjustments to the Windows XP computers on your network to enable them to see
the networked Windows 7 and Vista computers.
•When you set up your Windows computer, you gave it a name. Each computer on a network needs a
unique name (different from the names of all other computers on the network) so that the network can
identify it.
•Also, computers on a network can be located in various workgroups. For simplicity on a home network,
you should assign all your computers to the same workgroup.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 26


Configuring a Router to
Connect to the Internet
• Contact ISP for special settings
• Access router from Web browser
• Enter username and password
• Use router’s wizard to set up connection using settings and info provided by ISP
• Test Internet connection speed
– Speedtest.net
Notes :
•To set up your router so you can use it to connect to the Internet, you must first contact your ISP to help you with any
special settings that you might need to configure your router to work with your ISP.
•Next, you can access your router from a Web browser by entering the router ’s IP address or default URL. You can usually
find this information in the documentation that came with the router. You’ll also need a username and password to log on to
the router, both of which you’ll also find in the documentation that came with the router.
•Many routers feature their own wizard that takes you through unique configuration screens. If you’re unsure of any
information that needs to be entered to configure the router (such as whether IP addresses are assigned dynamically—
meaning you are assigned a new IP address by your ISP each time you connect to the Internet), call your ISP and ask for
guidance.
•There are numerous sites on the Internet, such as Speedtest.net, where you can test the speed of downloading files to
your computer and uploading files to other computers. You can then see how your results compare to other users in your
state and across the United States. Many factors can influence your Internet speeds, so be sure to run the test at several
different times during the day over the course of a week before complaining to your ISP if you think you aren’t getting your
promised speed.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 27


Securing Wireless Networks
• Wireless network range doesn’t stop at the property line
• Default device and network ID settings allow intruders to enter the network
• Internet bandwidth can be stolen
• Computers can be vulnerable to hacker intrusion and takeover

Notes :

•If you’re keeping a wired network secure with a firewall, you’re fairly safe from most hacker
attacks. However, wireless networks have wide ranges, including areas outside of your
house. This makes it possible for a hacker to access your network without your knowing it.
•Most wireless network adapters are set up to access the strongest wireless network signal
detected. Piggybacking is connecting to a wireless network (that is not your own) without
the permission of the owner. This practice is illegal in many jurisdictions but often happens
inadvertently between neighbors.
•Because your packets of information are being broadcast through the airwaves, a hacker
can intercept and decode information from your transmissions that might allow him or her to
bypass your firewall.
•Others might steal your bandwidth, and crimes can be committed through your network.

Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 28


Securing Wireless Networks
• To secure a wireless network, do the following:
– Change your network name (SSID)
– Disable SSID broadcast
– Change the default password on your router
– Turn on security protocols
– Implement media access control
– Limit your signal range
– Apply firmware upgrades

Notes :

•To secure a wireless network, you should take the following additional precautions:
1. Change your network name (SSID).
2. Disable SSID broadcast.
3. Change the default password on your router (use at least 8 characters with a combination of letters,
symbols, and numbers).
4. Turn on security protocols such as Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access
(WPA). Both use encryption (a method of translating your data into code) to protect data in your
wireless transmissions.
5. Implement media access control, which restricts access to the network to only certain media access
control (MAC) addresses.
6. Limit your signal range.
7. Apply firmware upgrades.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 29
Computer Skills For Preparatory
Programs

Chapter 7: Privacy, Crime, and Security

Copyright © 2011 Pearson Education,


1
Inc. Publishing as Prentice Hall
Privacy, Crime, and Security

Copyright © 2011 Pearson Education,


This Is Figure 9.18. Inc. Publishing as Prentice Hall
2
Objectives
• Understand how technological
developments are eroding privacy and
anonymity.
• List the types of computer crime and
cybercrime.
• List the types of computer criminals.
• Understand computer system security
risks.
Copyright © 2011 Pearson Education,
3
Inc. Publishing as Prentice Hall
Objectives
• Describe how to protect your computer
system and yourself.
• Define encryption and explain how it makes
online information secure.
• Describe the issues the government faces
when balancing the need to access
encrypted data and the public’s right to
privacy.
Copyright © 2011 Pearson Education,
4
Inc. Publishing as Prentice Hall
Privacy in Cyberspace
• Privacy is an individual’s ability to eliminate
the collection, use, and sale of confidential
personal information.
• Maintaining anonymity—the means to
communicate without disclosing one’s
identity—is more difficult with the use of
computers and the Internet.

Copyright © 2011 Pearson Education,


5
Inc. Publishing as Prentice Hall
Privacy in Cyberspace
• Technologies that
jeopardize online
anonymity include:
– Cookies
– Global unique identifiers
– Ubiquitous computing
– Radio frequency
identification
This is Figure 9.4.

Copyright © 2011 Pearson Education,


6
Inc. Publishing as Prentice Hall
Privacy in Cyberspace
• Cookies are small files written to
your hard disk by the Web sites you
visit. They can:
– Track your browsing habits
– Gather personal information without
your consent
– Can be disabled

Copyright © 2011 Pearson Education,


7
Inc. Publishing as Prentice Hall
Privacy in Cyberspace
• A global unique identifer (GUID) is an
identification number produced by software
or a piece of hardware.
– Web servers can read the GUID.
– Users are not always aware of the GUID.
– If used, companies allow users to opt out.
– Civil liberties groups and public concern have
decreased the use of GUIDs.
Copyright © 2011 Pearson Education,
8
Inc. Publishing as Prentice Hall
Privacy in Cyberspace
• Interacting with multiple networked devices is
called ubiquitous computing.
– An example is the adjustment of heat or light in an
environment based on signals sent by monitors built into
clothing.
– An active badge can transmit infrared signals to create an
electronic trail.
– Current devices such as smartphones hold private
information that can be exploited if the device is lost or
stolen.
Copyright © 2011 Pearson Education,
9
Inc. Publishing as Prentice Hall
Privacy in Cyberspace
• Radio frequency identification (RFID) uses
radio waves to track a chip or tag.
– Used for inventory control in stores
– Recognizes microchips in pets
– May compromise anonymity and privacy if
information stored on RFID tags attached to
U.S. passports is misused

Copyright © 2011 Pearson Education,


10
Inc. Publishing as Prentice Hall
Privacy in Cyberspace

Copyright © 2011 Pearson Education,


This is Figure 9.7. 11
Inc. Publishing as Prentice Hall
Privacy in Cyberspace
• Privacy advocates agree that citizens have the
right to:
– Be informed when information about them is being
collected
– Give or deny consent to have their information
collected
• Legislation currently in place includes:
– Fair Credit Reporting Act
– Health Insurance Portability and Privacy Act
– Family Education Rights and Privacy Act
Copyright © 2011 Pearson Education,
12
Inc. Publishing as Prentice Hall
Privacy in Cyberspace
• Protecting privacy online
– Use products such as Anonymous Surfing or
IronKey Secure USB flash.
– Use free Web-based e-mail addresses in chat
rooms and for mailing lists.
– Tell children not give out personal information.
– Complete forms only if you see a privacy
statement.
– Turn off cookies.
Copyright © 2011 Pearson Education,
13
Inc. Publishing as Prentice Hall
Privacy in Cyberspace

 Protecting privacy at home


– Create logins and passwords • Do not leave cell phones in
for each person using the public places.
computer. • Turn off services not in use,
– Do not save account numbers especially Bluetooth.
or passwords. • Verify that devices have
– Close a secured account site secure configurations.
when you are not at a
computer.

Copyright © 2011 Pearson Education,


14
Inc. Publishing as Prentice Hall
Privacy in Cyberspace

• Protecting privacy at work


– Refrain from making personal calls on a
work phone.
– Avoid using a company e-mail account for
personal purposes.
– Assume that your actions at work are being
monitored.

Copyright © 2011 Pearson Education,


15
Inc. Publishing as Prentice Hall
Privacy in Cyberspace

Copyright © 2011 Pearson Education,


This is Figure 9.14. Inc. Publishing as Prentice Hall
16
Computer Crime & Cybercrime
• Computer-based activities that violate the law are
known as computer crimes.
• Cybercrimes are crimes perpetrated through the
Internet.
• Cyberlaw is the area of law dedicated to
computer crime.
• Many Web sites educate users about cybercrime
and cybercriminals.

Copyright © 2011 Pearson Education,


17
Inc. Publishing as Prentice Hall
Computer Crime & Cybercrime

Copyright © 2011 Pearson Education,


This is Figure 9.15. Inc. Publishing as Prentice Hall
18
Computer Crime & Cybercrime
• Types of computer crime
– Identify theft is when a criminal gains access to
personal information in order to impersonate
someone.
• Criminals sometime use phishing attacks—
legitimate-looking e-mails or Web sites created in
an attempt to obtain confidential data about a
person.

Copyright © 2011 Pearson Education,


19
Inc. Publishing as Prentice Hall
Computer Crime & Cybercrime
• Types of computer crime
– Malware (short for malicious software) refers to
programs that intentionally harm a computer
system or allow individuals to gain access to it
without the owner’s permission.

Copyright © 2011 Pearson Education,


20
Inc. Publishing as Prentice Hall
Computer Crime & Cybercrime
• Types of computer crime
– Spyware is software that gathers private
information and tracks Web use and then
provides that information to third parties.
• Adware is a form of spyware that generates
annoying pop-up and banner ads
• Keyloggers record keystrokes to provide
cybercriminals with confidential data

Copyright © 2011 Pearson Education,


21
Inc. Publishing as Prentice Hall
Computer Crime & Cybercrime
• Types of computer crime
– A computer virus is code concealed inside a
program that can harm or destroy files.
• Many are spread through e-mail attachments.
• File infectors attach themselves to files.
• Boot sector viruses execute each time you start the
computer.
• Macro viruses attach to data files and take advantage of
application macros.

Copyright © 2011 Pearson Education,


22
Inc. Publishing as Prentice Hall
Computer Crime & Cybercrime

Copyright © 2011 Pearson Education,


This is Figure 9.17. Inc. Publishing as Prentice Hall
23
Computer Crime & Cybercrime
• More rogue programs
– A time bomb is a virus program that remains
dormant on a computer system until it is
activated by a specific event.
– A worm is similar to a virus but does not need
the action of a user to execute the code and
cause damage.

Copyright © 2011 Pearson Education,


24
Inc. Publishing as Prentice Hall
Computer Crime & Cybercrime
• More rogue programs
– A denial of service (DoS) attack assaults an
Internet server with so many requests that it
cannot function.
– A Trojan horse is a normal-looking program that
includes concealed instructions created to cause
harm.

Copyright © 2011 Pearson Education,


25
Inc. Publishing as Prentice Hall
Computer Crime & Cybercrime
• Fraud, Theft, and Piracy
– Memory shaving
– Software piracy
• Cybergaming Crime
• Tricks for Obtaining Passwords
• Salami Shaving and Data Diddling
• Forgery
Copyright © 2011 Pearson Education,
26
Inc. Publishing as Prentice Hall
Computer Crime & Cybercrime
 Types of computer criminals
– Hackers – Shills
– Cybergangs – Cyberstalkers
– Crackers – Sexual predators
– Virus authors – Cyberbullies
– Swindlers

Copyright © 2011 Pearson Education,


27
Inc. Publishing as Prentice Hall
Computer Crime & Cybercrime
• Cyberstalkers
– Use the Internet, social networking sites, and e-mail to
harass or threaten an individual.
– Most perpetrators are men.
– Most victims are college-age women.
• Cyberbullies
– Send threatening messages via e-mail or text message.
– Usually involves minors.

Copyright © 2011 Pearson Education,


28
Inc. Publishing as Prentice Hall
Security
• Computer security risk
– Any intentional or unintentional action that
results in damaging a computer system or its
data
– Increased by wireless LANs because
transmissions occur over shared airwaves
instead of dedicated lines

Copyright © 2011 Pearson Education,


29
Inc. Publishing as Prentice Hall
Security
• Security options available for wireless
networks include:
– WEP (Wired Equivalent Privacy)
– WPA (Wi-Fi Protected Access)
– WPA2
• Vacation hacking is tricking travelers into
using phony Wi-Fi hot spots called evil
twins.
Copyright © 2011 Pearson Education,
30
Inc. Publishing as Prentice Hall
Security
• Threats to the security of computer systems
include:
– Corporate espionage
– Information warfare
– Security loophole detection programs
– Attacks on safety-critical systems
– Terrorism

Copyright © 2011 Pearson Education,


31
Inc. Publishing as Prentice Hall
Security
• Protecting your computer system
– Use an uninterruptible power supply (UPS) to
provide additional power during outages or
electrical current fluctuations.
– Control access to computer systems though
appropriate password selection and know-and-
have authentication, which requires using tokens
to generate a login code.

Copyright © 2011 Pearson Education,


32
Inc. Publishing as Prentice Hall
Security
• Protecting your computer system
– Use biometric authentication—the use of
voice recognition, retinal scans, and
fingerprint scans for authentication purposes.
– Incorporate firewalls, which can be hardware
or software, to prevent unauthorized access.

Copyright © 2011 Pearson Education,


33
Inc. Publishing as Prentice Hall
Security
• Protecting yourself
– Do business with reputable companies.
– Don’t give out personal information.
– Be cynical of chat room information.
– Read documents carefully.
– Remain cautious when using the Internet.

This is Figure 9.25.


Copyright © 2011 Pearson Education,
34
Inc. Publishing as Prentice Hall
The Encryption Debate
• Cryptography
– The study of encoding messages
• Encryption
– A method of coding or mixing up a message so
that it can be understood only by the intended
recipient

Copyright © 2011 Pearson Education,


35
Inc. Publishing as Prentice Hall
The Encryption Debate
• Public Key Encryption
– Uses two keys:
• Public key to encrypt
• Private key to decrypt
– Essential for e-commerce
– Used to implement:
• Digital signatures, which guarantee that messages
haven’t been tampered with
• Digital certificates, which validate identity
Copyright © 2011 Pearson Education,
36
Inc. Publishing as Prentice Hall
The Encryption Debate

This is Figure 9.30. Copyright © 2011 Pearson Education,


37
Inc. Publishing as Prentice Hall
The Encryption Debate
• Public Key Infrastructure (PKI)
– Uniform set of encryption standards
– No dominant standard
– Public fear of a monopoly if a PKI is chosen

Copyright © 2011 Pearson Education,


38
Inc. Publishing as Prentice Hall
The Encryption Debate
• Encryption and Public Security Issues
– The U.S. government continues its search for
ways to balance the public’s right to privacy
and the government’s need to know.

Copyright © 2011 Pearson Education,


39
Inc. Publishing as Prentice Hall
Prosecuting Violators

• E-discovery is the obligation of parties to a


lawsuit to exchange documents that exist
only in electronic form.
• Computer forensics refers to legal evidence
found in computers and digital storage
media.

Copyright © 2011 Pearson Education,


40
Inc. Publishing as Prentice Hall
Summary
• Lack of complete federal regulations to
protect the right to privacy for individuals
allows numerous Web sites to collect and
accumulate personal information.
• Computer crime and cybercrime are on the
rise and include such crimes as identity
theft, malware, fraud, and theft.

Copyright © 2011 Pearson Education,


41
Inc. Publishing as Prentice Hall
Summary
• Computer criminals, such as crackers,
cybergang members, and virus authors, are
often the cause of the increase in computer
security risks.
• Security risks are events, actions, and
situations that could lead to losses.

Copyright © 2011 Pearson Education,


42
Inc. Publishing as Prentice Hall
Summary
• Although no computer system can be totally
safe, you can take simple steps to protect your
computer and data.
• Encryption can be used to guard privacy online
through public key encryption.
• The government must keep trying to find a
balance between its need to know and the
privacy rights of individuals.

Copyright © 2011 Pearson Education,


43
Inc. Publishing as Prentice Hall

You might also like