Professional Documents
Culture Documents
NCM-110-L4
NCM-110-L4
NCM-110-L4
COMPUTER MISCONCEPTIONS
COMPUTER CHARACTERISTICS
A computer accomplishes many
things that are impossible without it.
When programmed properly, it is
superb in remembering and
processing details, calculating
accurately, printing reports,
facilitating editing documents, and
sparing users many repetitive,
tedious tasks, which frees time for
more productive endeavors.
Remember, however, that computers
are not infallible. Being electronic,
they are subject to electrical
problems. Humans build computers,
program them, and enter data into
them. For these reasons, many
situations can cause error and
frustration. Two of the most common
challenges with computers are
"glitches" and the "garbage in,
garbage out" (GIGO) principle . That
is, if data input has errors, then the
output will be erroneous.
OVERCOMING COMPUTER
ANXIETY
Supercomputers
Technically, supercomputers are
the most powerful type of
computer, if power is judged by the
ability to do numerical calculations.
Supercomputers can process
hundreds of millions of instructions
per second. They are used in
applications that require extensive
mathematical calculations, such as
weather forecasts, fluid dynamic
calculations, and nuclear energy
research. Supercomputers are
designed to execute only one task
at a time; hence, they devote all
their resources to this one
situation. This gives them the
speed they need for their tasks.
Mainframes
The first computers were large,
often taking up an entire room.
They were known as mainframes
and were designed to serve many
users and run many programs at
the same time. These computers
formed the backbone of many
hospital information systems.
Users used what were technically
called videotext terminals, but
often referred to as "dumb
terminals." A videotext terminal
consisted of a display screen,
keyboard, and modem or device
that connected it to the mainframe.
Information was entered on the
keyboard and transmitted to the
mainframe, which was located
somewhere else, often in the
basement in a secure,
temperature-controlled room. Any
processing done to the information
was done by the mainframe, which
returns the results to the screen of
the videotext terminal. This is why
you still find the IS departments in
the basement of hospitals.
Minicomputers
As computers became more
powerful, their size was reduced.
The same work done by a
mainframe became amenable to
being accomplished on what was
termed a minicomputer.
Minicomputers were like
mainframes (i.e., they were
multiuser machines that originally
served videotext terminals), but
they were smaller and less costly
unlike larger mainframes, they did
not require a special
temperature-controlled room and
were useful in situations with fewer
users. As computers started to be
built in many sizes, it became
impossible to classify one as a
mainframe or another as a
minicomputer; these terms are
seldom used today.
Servers
The functions served by
mainframes and minicomputers
today are performed by computers
of varying sizes, which are referred
to as servers. The functions
performed by servers and their
powers are as varied as the needs
of the users. These functions vary
from servers that operate in the
mainframe/video text format
especially in hospital information
systems to those that are just a
repository for files (a user-created
item) that are "served" to users
who have software that does the
processing on their personal
computer (PC). Some servers in
the middle of this continuum may
also store the programs that a user
needs and provide them as
needed by the user.
Thin Clients
Thin clients are today's version of
the video-text terminal. These are
computers without a hard drive and
with limited, if any, processing
power. Besides costing much less,
thin clients do not need to be
upgraded when new software is
made available because they do
not contain any applications.
Because they do no processing,
older PCs can function in this
capacity instead of being retired.
Personal or Single-User
Computers
PCs are designed for one
individual to use at a time. PCs are
based on microprocessor
technology that enables
manufacturers to put an entire
processing (controlling) unit on one
chip, thus permitting the small size.
When PCs were adopted in
business, they freed users from the
resource limitations of the
mainframe computer and allowed
data processing staff to
concentrate on tasks that needed a
large system. Today, although
capable of functioning without
being connected to a network, in
businesses including healthcare,
PCs are usually connected or
networked to either other PCs or
servers. They still process
information, but when networked,
they can also share data. In
information systems, PCs often
replace the old videotext terminal
and handle the tasks of entering
and retrieving information from the
central computer or server,
although thin clients may be used
for this purpose instead. When a
full PC is available on the unit,
personnel can use application
programs such as word
processing. PCs are available in
many different formats such as a
desktop or tower model, laptops,
and tablet computers.
Laptops/Notebooks. As computer
usage became popular, people
found that they needed the files
and software on their computer to
accomplish tasks away from their
desks. The first computer that
made this practical was really more
transportable than portable.
Developed in the 1980s, it was
about the size of a desktop and
had a built-in monitor. Toward the
end of the 1980s, the
transportables were replaced by
true portables: laptops, or
computers small enough to fit on
one's lap. As technology continued
to place more information on a
chip, laptops became smaller.
They are now referred to as
notebook computers. Some
healthcare organizations use
notebook computers for
point-of-care (POC) data entry at
the bedside or anyplace where
care is delivered.
Hardware is the term that describes the physical pieces of the computer,
commonly grouped into five categories.
1. Input - Data must be placed into the computer before the computer can be useful.
2.
Memory - All data processing takes place in memory.
3.
Central processing unit (CPU) - This is the "brain" of the computer, which
coordinates all the activities and does the actual data processing.
4.
Storage - The data and programs can be saved for future use.
5.
Output - Processed data are of little value to people unless they can see the data
in some form.
Software is the term that describes the nonphysical pieces. It can be grouped into
two categories.
1. Operating system - This is the collection of standard computer activities that need
to be done consistently and reliably. These processes are the building blocks for
computer functions and programs. Well known examples include Microsoft
Windows, Apple OS X, and the open source Linux flavors.
2.
Application programs - These are packages of instructions that combine logic
and mathematical processing using the building blocks of the computer. Programs
are what make computers valuable to people by transforming raw data into
information. Examples of applications include spreadsheets, word processing,
games, photo managers, etc.
Operating Systems Application Programs
• Chip refers to a small piece of silicon that has electronic logic circuits built into it.
A chip can hold thousands of circuits in something that is about one-quarter of an
inch on each side. The chip is the fundamental physical piece used for computer
memory and central processing units.
• RAM and ROM are the two types of memory that a computer uses. ROM stands
for Read-Only Memory. This memory has information already stored in it by the
computer manufacturer, and nothing is allowed to change that information. RAM
stands for Random-Access Memory. This memory has no information in it but is
available for any program to store information.
• Bit is the smallest part of computer memory. It can hold exactly one piece of
information that has only two possible values, either a one (1) or a zero (0). This
"two-value" system is called a binary system.
• Kilo, mega, and giga are prefixes that represent certain multipliers. Although
"kilo" in scientific notation means “1000" (103), its value is changed to "1024" (210)
when talking about computer memory or storage. Numbers that are powers of 2
(e.g., 4 is a power of 2, being 22) are chosen because the computer uses a binary
system. Thus, one kilobyte of computer memory represents 1024 (1 x 1024) bytes,
two kilobytes represent 2048 (2 x 1024) bytes, and so on. One megabyte
represents 1,048,576 (1024 x 1024) bytes, and one gigabyte represents
1,073,741,824 bytes (1024 x 1024 x 1024). Although it is not accurate, most
people tend to still give kilo, mega, and giga their normal values of 103,106, and
109 when referring to computers.
• Megahertz (MHz) and gigahertz (GHz) describe the frequency that the central
processing unit's internal clock uses for its timing control.
Computer technology has had an explosive growth during the past several
decades. The large computers that used to fill their own special purpose rooms
have in many cases been replaced by computers small enough to fit on a desk
("desktop" model), on one's lap ("laptop" model), or in the palm of one's hand
("palmtop" computers). This trend is expected to continue.
Keyboard
The CPU of a computer is often referred to as the brains or the brain center.
Technically, the term CPU is an abbreviation for Central Processing Unit. Also
known among computer geeks as the box, the CPU is housed inside of metal
housing which usually includes floppy drives, hard drives and other peripheral.
The CPU itself includes what is known as the motherboard of the computer – the
central board which holds all of the computer's RAM [random access memory] and
all of the related components such as cooling fans, resistors and other electronic
parts which cause the computer to function properly. The computer's RAM size
determines the size of programs the computer can use. Generally, a software
package will have a RAM quote on it – that is, the amount of RAM necessary to
operate the program. A computer operator must check the software requirements
for RAM against the system's known size. Most programs today require no more
than 512MB [mega bytes] of RAM to operate.
Also contained in the CPU and the motherboard, is the computer's ROM [read only
memory], another essential component of the computer's brains. The ROM
functions in the motherboard to contain or store the program or programs which
boot-up [or start up] the computer. Anytime the ROM in a computer is damaged on
the motherboard, then the computer will not start up correctly and possibly not at
all
Processors
● Memory
The two basic types of memory, ROM and RAM, were defined earlier.
Generally, a computer has a sufficient amount of ROM built in by the
manufacturer. ROM is preloaded with the low-level logic and processes
needed to start the computer when its power is turned on (a process called
"booting up"). Most computers also have a starting amount of RAM
preinstalled. RAM can be purchased separately, though, and installed as
needed. Application programs are loaded, when called for, into RAM. The
program executes there and stores information in other parts of RAM as is
needed. Today, application programs have growing RAM requirements as
more logic and functions are packed in them.
● Central Processing Unit
The CPU of a computer is often referred to as the brains or the brain center.
Technically, the term CPU is an abbreviation for Central Processing Unit. Also
known among computer geeks as the box, the CPU is housed inside of metal
housing which usually includes floppy drives, hard drives and other peripheral.
The CPU itself includes what is known as the motherboard of the computer –
the central board which holds all of the computer's RAM [random access
memory] and all of the related components such as cooling fans, resistors and
other electronic parts which cause the computer to function properly. The
computer's RAM size determines the size of programs the computer can use.
Generally, a software package will have a RAM quote on it – that is, the
amount of RAM necessary to operate the program. A computer operator must
check the software requirements for RAM against the system's known size.
Most programs today require no more than 512MB [mega bytes] of RAM to
operate.
Also contained in the CPU and the motherboard, is the computer's ROM [read
only memory], another essential component of the computer's brains. The
ROM functions in the motherboard to contain or store the program or
programs which boot-up [or start up] the computer. Anytime the ROM in a
computer is damaged on the motherboard, then the computer will not start up
correctly and possibly not at all.
There are several types of CPU chips. In the personal computer world, the
Intel Corporation is probably the most recognized manufacturer with, first, its
80 x 86 series of CPU chips (i.e., 80386,80486,...) and then its Pentium chip
(i.e., Pentium 4 or P4) series. In the large computer world, IBM (International
Business Machines) is probably the most recognized name.
●
● One measure of CPU processing capacity is called MIPS ("millions of
instructions per second.") Although not a totally accurate measure, it is useful
to see the growth of processing capacity over time. Intel's 80386 chip,
produced in 1985, was rated at 5 MIPS. Intel's Pentium chip, introduced 8
years later in 1993, was rated at 100 MIPS—about 20 times faster. Intel's
Pentium 4 chip, made 7 years later in 2000, was rated at 1700 MIPS.
All CPUs have three basic elements: a control unit, an arithmetic logic unit
(ALU), and an internal memory unit. The ALU performs all the mathematical
operations, the control unit determines where and when to send information
being used by the ALU, and the internal memory is used to hold and store
information for those operations. The CPU has an internal system clock that it
uses to keep everything in synchronized order. The clock's speed is described
in terms of frequency, using megahertz (MHz) or gigahertz (GHz), so a CPU
might be described as having a clock speed of 450 MHz or 2.4 GHz.
Generally, the faster the clock, the faster the CPU can process information.
Storage
The memory of a computer is not the place to store information and programs for a
long time. ROM is read-only (unwritable) and therefore not of any use. RAM holds
programs and information but only so long as the computer is turned on; once
turned off; all information in RAM is gone. Therefore other means are used for
long-term storage, the most common technologies being magnetic, optical, and
special nonvolatile memory.
●
Hard Drive is the computer's primary data storage unit. The hard drive
generally holds all of your programs and all of your created, downloaded
and saved data.
● A flash drive is a small, portable drive that can hold as much as small hard
drives [internal drive]. Most flash drives are the size of a small cigarette
lighter and fit in the palm of your hand. They come in several popular sizes,
most commonly: 512MB; 1GB; and 2GB. They range on average from
$19.95 to $99.95 and are popular among the jet set, executive crowd.
Memorex gives theirs a standard dog-tag styled neck rope similar to
company security passes that makes it easy to carry and access.
Flash drives have replaced the older floppy drives, they are easier to use
and they hold a lot more information on them. They are quickly inserted,
accessed, and removed from most small and personal computers. Older
computers have their USB ports in the rear of the CPU [where the power
cord plugs in], while the newer computers have the USB port in the front,
next to the CD drive. The USB port is what the flash drive plugs into directly.
The cool thing about the flash drive, other than its portability, is that when
you plug it in you do not have to go searching to find it in the computer. The
USB port on any computer will automatically prompt the computer to pull up
the flash drive for the user. From that point, you simply click and select your
file to use or save.
● CD drives read documents saved on CDs [compact disk]. A CD will hold up
to 700MB of information on it. Most CDs are not erasable, so they do not yet
have the flexibility of the earlier floppy drive. However, the CD is a more
reliable storage tool because it is sealed into a digital format. Unless you
break your CD, the information is relatively safe.
Most computer programs and teaching programs are sold on CD. When you
buy a new computer program, you download it from a CD and the CD
serves as your backup information. If your computer has a CD burner in it,
then you can also make CDs of anything you create. You create the file,
save it, and burn it into a new CD. Then it is available to share with others
on their computers.
● Floppy Drive is an older type of information saving device that is still
peripherally in use. Generally, a floppy disk is a 3.5 inch disk encased in
plastic with a sliding access panel for the computer to read the information
from. Users insert a floppy disk into the floppy drive, usually located on the
front panel of your CPU, and save data onto the floppy for use at their
convenience and in other locations.
Today, the CD drive and the flash drive are replacing the floppy drive.
However, there are still quite a number of small businesses and personal
computer users which rely on floppy drives to save their creations and
company information.
● Removable Disk Drive is the same kind of device as a hard disk drive with
similar storage capabilities. The difference is that the magnetic storage
media can be removed and replaced, just as with a floppy disk.
● Tape describes a medium that can magnetically encode a lot of information.
In many ways, tape in a computer system is used like audio tape. Computer
tape is typically used to store a copy of important information, to be
recovered in case of a major problem with the computer. Tape is packaged
in various ways, from large reels to small cartridges. Tape is reusable.
Output
Printer
Plotter
Monitor
●
Monitor is the visual display screen for the contents of the computer and
the data being worked on or viewed. It is similar to a television screen and it
displays the computer's content at a comfortable brightness and resolution.
The older monitors are large and bulky like a small office machine. Jokingly
referred to by geeks as "boat anchors", the older, large monitors are on their
way out of popular use. The newer monitors are similar to the newer
televisions in that they are light weight and slim. Generally, the newer
monitors weight under 3 pounds, are 4 inches or less in thickness, and are
referred to as flat screens. The most common sized monitors used in small
business and home computer operations are 15", 17" and 19" screens.
Monitors can be adjusted internally to accommodate the operator's comfort
level for viewing. The lower the resolution selected, the larger the lettering is
on the screen. Most monitors can be adjusted for a resolution level between
600 X 800 pixels [micro dots per inch] to 1280 X 1024 pixels. There are two
reasons to adjust the resolution:
○ Size and/or use of the monitor – larger screens require smaller resolution,
and gaming programs require smaller resolution for the best experience.
○ To make the user more visually comfortable – smaller resolution will cause
the letters in any screen to appear larger.
There are (5) five basic types of operating systems (OS) used in small office and
home computer systems today. They are:
1. DOS – Disk Operating System. This is the system of most home computers.
2. MS DOS – Microsoft's version of DOS. If the home computer is made by Microsoft,
or if it operates on a Microsoft based system such as Windows XP or any of the
Windows series, then it operates on MS DOS.
3. UNIX – A widespread operating system used primarily in businesses. Originally
developed by engineers at Bell South in the late 1960's.
4. Linux – A derivative of the UNIX system, developed into a more flexible system in
the early 1990's. This is an up and coming OS that is starting to take hold in the
marketplace.
5. The Mac OS series – Used by owners of Apple's Macintosh series of computers
a.k.a. Apple or Mac.
Because GUIs are easy to use, most healthcare information systems use a GUI
operating system, usually a version of Microsoft Windows. For this reason, as well
as the computer fluency demanded of healthcare professionals, it is appropriate to
review some basics of using Windows. When a PC is turned on and finishes
booting (often a three- to five-minute process!), the screen that appears is called
the desktop. The desktop has icons representing many of the application programs
that are installed on the computer. Below these icons is the name of the
application that the icon represents. When "clicked" (putting the mouse pointer on
the icon and left clicking), the program the icon represents will open.
OPENING A PROGRAM IN A PC
As with all things with Microsoft Windows, there are several ways to start a
program when using a PC. Clicking the icon on the desktop, mentioned earlier, is
often used when the computer is first turned on. If an icon for the desired program
is not on the desktop, the user should click the Start button, then click All Programs
and click the name of the program on that list. The Start button, so called because
it "starts" processes, is located in the lower left corner of the screen. In Windows
Vista, the start button is the Windows logo surrounded by a blue circle. Some
programs that are together in a suite such as Corel Office, Lotus SmartSuite, or
Microsoft Office may require that the folder containing all of them be opened, then
the program selected from the secondary menu contained in the folder. In XP, this
will be indicated by a black triangle mark pointing to the right. In Windows 7, a
container or more programs will be the folder icon as seen in Figure 3-1. In either
case, clicking the container will show the programs with that folder, and you can
make your selection from there.
WORKING WITH A PROGRAM IN A PC
Once a program is opened, you will see the work screen, which may look like any
of those in Figure 3-2. The choices on the menu bar can be clicked for a menu of
features classified by that choice. If you are using Microsoft Word 2007, the menu
bar is replaced with tabs, which when clicked have icons for the features classified
under that tab. When first starting to use a new application program, or a major
update, using Help to find the feature you want is often necessary.
All programs will have a symbol, which represents the mouse pointer, the shape of
which may vary according to the task and the program. In some cases it can be
changed by the user. In word processing software it is often a vertical "I" bar; in
spreadsheets it may be a large plus sign; and in a presentation or graphics
program, an arrow. Although many choices on the top of the screen may be
represented by icons, if you rest the mouse pointer on an icon, after a few seconds
words describing what the icon is will appear.
MULTIPLE WINDOWS
One of the advances of GUIs over DOS included the ability to have multiple
programs open at the same time and to easily move data between them. This
makes it possible to copy a graph from a spreadsheet into a word processor.
In the context of a PC, the term "windows" may refer to the operating system or to
the various content boxes that appear on the screen. Each program that is open
creates its own window and places a tab on the task bar on the bottom of the
screen. If a word processor and a spreadsheet program are open simultaneously,
two program windows are open; both may or may not be visible on the screen at
the same time. Closing the window in any program involves clicking on an X in the
upper right corner of the screen. In some programs you will see two Xs, one on top
of the other (see Figure 3-3). In these cases clicking the top one, which is usually
red, will close the program itself and all the files that are open in that program,
while clicking the lower one will close only the file that is open, leaving the
application itself open. If there is only one X, clicking it will close that file and
instance of the program.
Looking at the task bar at the bottom of the screen tells you how many instances of
each Microsoft program are open, and any other programs that are open. When so
many programs are open that there is no room on the task bar, multiple instances
of the same program will be grouped under one icon meaning that you will have to
click that tab and select which file you wish to use for that program.
Navigating Between Programs and Files
One of the hardest things to grasp for new users of GUIs is that not only is it possible to
have many different windows open at one time, but using this option is an aid to
productivity. As mentioned earlier, when you have more than one program or file open, the
program name will be on the task bar, which is at the bottom of the screen. If this line is
not visible, place your mouse pointer on the bottom of the screen, and it will appear.
Part of the left side of the task bar is the Quick Launch bar to which you can drag
icons either from the desktop or the program list for programs that you frequently
use. Then instead of using the desktop or All Programs from the Start button to
open a program you can click the icon in the Quick Launch bar that represents the
program you wish to open. If you can't remember what the icons represent, rest
your mouse pointer a second or two on it and the name of the program will appear.
Not only does Windows allow you to have more than one window open at a time,
it lets you see multiple windows at the same time. Often when you open a
program, you will see that it does not take up the entire screen. You may even
see another program, or the desktop behind it. In this format, the window is said
to be "minimized." This holds true whether it takes up almost the entire screen or
is reduced to just the title bar (see Figure 3-4). You can maximize it by clicking
the square in the upper right corner of the screen and minimize it by clicking the
3D square that replaces the original square when the window is maximized.
In a minimized format, you can place your mouse pointer on the sides of the
window until it becomes a double-edged arrow, then drag the side to change the
size of the window. To move a window, place the mouse pointer in the title bar, or
the top line of the window that has the name of the program and often of the file
itself, and drag the window wherever you want it. If the windows overlap, the
window that is the active window, or the window in which you are working, will be
on top. Clicking in a window makes it the active window. If the windows are side
by side, the active window is the one where the mouse pointer is, although
sometimes the title bar will be a little darker in color in the active window. Placing
windows side by side or one on top of the other can be very useful when working
on two files in the same program, or needing to synchronize files from different
programs.
Operating systems usually come with some utilities and built-in software.
Certain utilities are helpful with disk maintenance, such as the disk utilities
ScanDisk and Disk Defragmenter. Additional accessories such as Paint, a
simple drawing program, allow a user to create drawings or various shapes,
such as circles, squares, or triangles, in any of the colors available in the
program. Also available are writing accessories such as Notepad, a product
that is useful in creating files in ASCII (American Standard Code for
Information Interchange), which is a format that can be read by many different
programs.
EXITING WINDOWS
In the earlier sections we have discussed how to close a file on which you are
working, and how to close a program. Before shutting down a computer, it is
necessary to exit Windows. Although invisible to users, Microsoft Windows,
like all operating systems, actually works very hard behind the scenes to
provide its many functions, as do many of the application programs. To do this,
application programs and Microsoft Windows have to have easy access to
specific information. Often, this is accomplished by creating files on the hard
disk of the information that the application needs to use. These files are
temporary and unknown to the users. They are created, changed, and deleted
as users change what they are doing. Before quitting Windows, the application
programs need to be able to shut these files down. If users do not exit all
programs and close Microsoft Windows properly, these temporary files are left
on the disk and can cause problems as well as fill up your hard disk. To exit
Windows and shut down your computer, click the Start button in the lower left
corner of the screen, select Shut Down from the menu and let the computer go
through the shutdown process, which may take a minute or more. If during the
time you have used the computer, a program or the operating system has
downloaded some updates, you may see a message that files are being
updated, please don't turn off the computer. This message may or may not add
that the computer will be turned off by the program, when the installation is
complete, but in most cases this will occur.
Types of Software
●
Graphical User Interface (GUI) Software - is a special type of software in
common use today. It can be part of the operating system software, or it can
be a complete application program on its own; at times, a GUI (pronounced
"gooey") seems to straddle the line between operating and application
software. The basic design of any GUI is that it stands between the operator
of the computer and the computer itself and acts as the go between. Any
GUI has two primary goals: (1) to shield the operator from needing a great
amount of technical knowledge to use the computer effectively and
correctly; and (2) to give a consistent “look-and-feel" to application
programs (if they are designed for it).
Accomplishing the first goal means that an operator can perform all
necessary technical tasks (e.g., copying data files between disks, backing
up information) by pointing at icons (small pictures) on the screen. These
icons represent tasks that can be done. For example, by pointing to an icon
that represents a desired data file and then dragging that icon over onto
another icon that represents a printer, a person can print the file.
Note that because of the GUI's capabilities, the person did not have to know
the correct operating system commands to print the file. Accomplishing the
second goal means that any application program can be designed so it is
less difficult for a person to learn how to use it. Basically, the GUI defines a
standard set of functions that it can provide (e.g., open a data file, save a
data file, print a data file) and gives standard ways for application programs
to use these functions. If application programs are designed and built to use
these functions, a person has to learn only once how to open a data file.
Any other program that uses the GUI functions has the same "look-and-feel”
that is, a person can open a data file in the same manner. Doing things in a
consistent, predictable way not only reduces a person's learning time but
increases a person's comfort level and productivity.
● Databases and Relational Database Management Systems - A database
is a data file whose information is stored and organized so it can be easily
searched and retrieved. A simple analogy is a filing cabinet drawer.
●
● The difference between a file and a database is the same difference between a file
drawer that has reports dumped into it in any old way and a drawer that has neatly
labeled file folders, arranged in meaningful order, with an index that shows where
to store a report. In both cases, we know the information we need is in the file
drawer—only in the second case (i.e., the database) we are confident that we can
find that information quickly and easily.
A database management system (DBMS) is a set of functions that
application programs use to store and retrieve information in an organized
way. Over the years, various ways to organize information have been used
(e.g., hierarchical, network, indexed). The way it is used most frequently
now is called relational. A relational DBMS stores information in tables (i.e.,
rows and columns of information). This approach allows powerful searches
to be done quite easily.
● Operating systems - are the basic control programs for a computer. All the
basic logic required for using a computer's hardware, such as the monitor, the
printer, and the hard drive, is contained in the operating system. Because the
operating system handles those computer parts, it is unnecessary for application
programs to do so. An example in the personal computer world is Microsoft
Corporation's Windows operating system.
●
There are (5) five basic types of operating systems (OS) used in small office
and home computer systems today. They are:
1. DOS – Disk Operating System. This is the system of most home
computers;
2. MS DOS – Microsoft's version of DOS. If the home computer is made by
Microsoft, or if it operates on a Microsoft based system such as Windows
XP or any of the Windows series, then it operates on MS DOS;
3. UNIX – A widespread operating system used primarily in businesses.
Originally developed by engineers at Bell South in the late 1960's;
4. Linux – A derivative of the UNIX system, developed into a more flexible
system in the early 1990's. This is an up and coming OS that is starting to
take hold in the marketplace; to learn more, go to: http://www.linux.org/,
and;
5. The Mac OS series – Used by owners of Apple's Macintosh series of
computers a.k.a. Apple or Mac.
Most Commonly Used Computer Terms
The terms listed in this lesson are meant to be beginner's terms only. Reference
for more advanced studies of terms and computer jargon are listed at the end of
the lesson. Included in some of the term's definitions are helpful information and
tips, particularly for those terms which require more details.
Backup
A saved copy of your computer hard drive, temporary files or current project.
Generally, a backup is a digitally saved copy [on CD] of everything on your hard
drive. Programs such as Ghost will also handle this task automatically although
most home operators perform the task manually themselves. It is essential to
anyone who seriously works on computers to backup their work. Computers crash,
accidents happen, files get erased by the unsuspecting, and work can be forever
lost without a backup.
Boot up
Bug
A bug is an error in programming that was overlooked. Bugs are the primary
reason for updates that have to be downloaded from the internet to keep your
system up to date and running smoothly.
Burn
Bytes
Eight bits is a byte. Each bit is designated by a 1 or zero; this is the basis of all
written computer code. Technically, there are differences, but to the novice, the
easy way to think of it is that a byte is most commonly a letter, punctuation or
space.
CD
Compact disk; a small, plastic disk which retains information in a digital format
[there are a variety of digital formats which can be recorded on a CD]. The CD
superceded the floppy disk because it encases the saved information in a hard
plastic that is impenetrable without excessive force. It is virtually weatherproof and
cannot be easily destroyed.
Chat Room
An online forum in which people [usually adults although some young adult forums
exist] can talk to one another instantly via a login and password system. Most chat
rooms cover specific topics: consumer advice or advocacy; dating; politics;
religion; technical information; and others.
Crash
For the computer to crash is to have it suddenly stop working and refuse to restart.
Indications of this are that you cannot get it to boot up, you cannot get it to reboot,
you cannot access your files, or it will not give you a prompt in DOS. Usually, if
your system crashes, the information on your hard drive is gone forever unless it is
backed up somewhere.
Doc File
A doc file is usually a reference to the Microsoft Word program in which a
document is saved with a file extension of .doc. Doc files are some of the most
common files sent in emails and used to transfer information from person to
person in the internet.
Download
DOS
The abbreviation for "Disk Operating System"; also known as THE Microsoft
language. Every product produced by Microsoft is written in DOS.
DVD
An abbreviation for "Digital Versatile Disk". It is currently the most high powered
portable storage disk available on the market. The current maximum storage for a
DVD is 4.7GB which is more than 5 times the storage space on a CD.
e-Book
Email
Online electronic communication between people in different locations. Most
commonly email is provided for and supported by large search engines, individual
websites and public library accounts. Some of the best places to look for free
email providers are:
● Google – http://mail.google.com
● Yahoo – http://www.yahoo.com
● Free Email Provider's Guide -
http://www.fepg.net/providers.html
● EmailAddresses.com -
http://www.emailaddresses.com
Flash Drive
A flash drive is a small, portable drive that can hold as much as small hard drives
[internal drive]. Most flash drives are the size of a small cigarette lighter and fit in
the palm of your hand. They come in several popular sizes, most commonly:
512MB; 1GB; and 2GB.
Folder
A file; a place to store your documents. Located in the directory of your hard drive
[a.k.a. C drive].
Format a drive
Gigabytes
Hardware
Hardware is all of the physical, tangible elements of your computer.
ISP
Information Services Provider; the company that brings your computer services to
your house or business. ISPs are very similar to your phone or electric company in
that they provide a specific service. Most ISPs utilize your current phone cabling or
your satellite/television cabling to provide their services.
JPEG File
Joint Photographic Experts Group is the name of the committee that wrote the file
format that is now in widespread use for most online photos that are shared or
posted on public sites. This is a file type in which you will save most of the photos
that you use in your computer.
Laptop
A small, self-contained computer that can fit in your lap. Generally used for mobile
purposes such as business or travel.
Megabytes
1024 kilobytes; 1 kilobyte is 1024 bytes.
Modem
A communications medium between your computer and the ISP, most commonly
contained in a box that connects to your computer with Ethernet cables and phone
cables. The exception to this is the FIOS [fiber optic cable] services available from
Verizon.
Network
The computers in your home or business which are all connected together.
PDA
Also known as a personal digital assistant; the most popular ones are the Palm
Pilot and the Blackberry. You can send and receive email and other documents via
your PDA.
PDF File
Technically, it means portable document format. The .pdf format is used primarily
on Adobe's Acrobat programs. Adobe owns the market on this format, and
provides free readers to anyone online. Without the current Acrobat reader you
cannot see a .pdf file unless you purchase the Acrobat program for about $450.
The .pdf file is a common and popular file type for business forms, e-Books and
general mainstream documents.
Phish
Hackers and others bait email users to try to attain the user's personal identity and
credit card information for the purposes of perpetrating fraud and/or identity theft.
Phishers also post fake websites that look identical to the real ones so they can
trick users into giving their credit card information.
Program
Also known as software, a program is a set of commands, written in a computer
language, which instructs the computer to function in certain ways. Examples of
common programs include the Windows collection of popularly used products such
as, MS Word for everyday document production, MS Excel for everyday
accounting calculations and spreadsheets, and MS Access for everyday database
creations for small offices.
Reboot
Reboot is what a computer operator does when his or her computer crashes or
suddenly shuts down and stops working.
Snail Mail
Snail mail is opposed to email which is fast, almost instantly and electronically.
Snail mail is your regular paper delivery mail service in your country.
Surfing
Surfing is what computer operators do when they go online via the internet and do
searches for various needs or topics. Surfing is what you are doing when you are
looking for what you need; similar to shopping, except it is the web version.
Text File
A text file [.txt ] is the most common file used. It is also the most adaptable for
anything you want to use the contents for in the future .
Trojan
A Trojan is a hidden program inside of another program, usually serving a good
purpose. However, in reference to email and the internet, a Trojan is commonly a
particularly nasty type of virus that comes in via a hidden method.
Virus
● Backup Systems
The most traditional method of backing up your data is the disk system. For
home computers and small home offices a floppy disk, CD disk, or flash
drive is the best method for saving a backup copy of your created data.
Innumerable computer operators, authors, artists, creators of original works,
and others have lost their work due to the simple oversight of a basic
backup system. Any creation of yours, in which you take time to build it and
store it, is worth saving to a recoverable file.
● Preserving Your Data
The method of backup and storage that you decide to use will determine the
quality of preservation for your data. How well your data is preserved
determines its use in the future. Therefore, it is worth the effort to keep your
data backed up and preserved in systems that have longevity and can be
accessed easily for many years.
To the average home computer operator, I would suggest that you preserve
your files in CD backups at least once every 3 months or in a flash drive
every month. Be sure to store your backup copies in a location off of the
premises of your computer, preferably a safe deposit box or a relative's safe
in their home. If your home or office were severely vandalized or caught on
fire, you want your data in an off-site location so that you can recover your
work.
The same is true for small business operations, except that the backups
should be weekly and definitely stored in a safe deposit box in your bank or
similar financial institution.
● Protecting Your Data
Data is best protected by a number of factors such as passwords,
encryption, storage location and method. Passwords protect accessibility to
your data, encryption protects your data from being used by unscrupulous
or unauthorized individuals, storage method will determine your data's
ability to survive natural disasters and weather fluctuations, and location will
help to secure your data in dire emergency situations and other similar
instances.
Small businesses are usually more concerned than individuals about these
factors, although freelancers, independent contractors and others who earn
their living in a more independent way than normal employment will also
find protection a central concern for them.
Terminals, Workstations, Stand-alone
● Terminals
●
● In the early days of computer technology, an organization usually required only a
single large-capacity computer to handle its information needs. These computers
were called "mainframes." They required a trained staff to maintain and run them and
were quite expensive to purchase and upgrade (e.g., add more memory, more disk
storage). People gave information and commands to the mainframe through a
"terminal," essentially just a keyboard and monitor; the terminal had no processing
capability of its own. The number of terminals a mainframe could handle was limited,
which created lineups of people waiting their turn to submit computer requests.
● Workstations
Advances in computer technology, such as IBM's personal computer
introduced in 1981, dramatically changed this situation. Now it was possible to
have a powerful computer right in the office and for far less money. What is
more, all its resources and power were under the control of, and totally
available to, its user. As people began to move toward personal computing,
computer manufacturers built more powerful workstations. Soon, these
powerful workstations became small enough to be easily moved, promoting
the idea of "mobile computing." Today, laptop computers easily allow
computer technology to be available at the point of care.
● Stand-alone
●
● By "stand-alone" we mean that all the pieces of a computer that are needed to
gather, process, display, possibly store, and provide an output of the information are
physically connected; moreover, if needed, they can be moved as a complete unit to
another location. This is the usual setup for most home and small business computer
systems. Such a setup is inexpensive and quite simple to manage. Although it makes
sense to use a "stand-alone" computer, it is often better for a computer to be part of a
network.
Peripherals
Connecting Peripherals
A peripheral is connected to a computer through a port. Although today the USB port
is the de facto standard for PCs, in the past there were other types of ports such as
serial and parallel. Computers manufactured in the last few years do not have serial
or parallel ports.
● USB PORT or universal serial bus is a standard that was originally created to
connect phones to PCs in the mid-1990s ("Everything USB ... We Mean
Everything!"). Lately, it has become the standard port for connecting
peripherals to PCs. These ports are a thin slot, about half inch by one fourth
of an inch, which are found on the sides of laptops and on the front of newer
desktops or towers. The port is designed with a solid piece in one part, usually
the top, so that USB device can only be inserted one way. The original USB
port was capable of transmitting data at only 12 megabits (Remember, it takes
8 bits to form a byte, which is required to transfer one letter) per second,
which made it useful for only mice and keyboards ("Everything USB . . . We
Mean Everything!"). This easy connection method, however, created a
revolution that resulted in devices such as flash drives, external hard drives,
and webcams, which needed faster transmission speeds. This need was met
by a new standard, the USB2.0 port, which transmits information at 480
megabits per second. The USB connection has largely replaced older serial
and parallel connectors.
● FIREWIRE originated in the mid-1980s as a high-speed data transfer method
for Macintosh internal hard drives (Nathanael, 2006). Apple presented this
technology to the Institute of Electrical and Electronics Engineers (IEEE) who
in December 1995 released IEEE 1394, which is an official Firewire standard.
It was often referred to as Firewire 400 and had transfer speeds of 100 to 400
megabits per second. In April 2002, the IEEE released a new standard for
Firewire 800, which can theoretically transfer data at up to 3.2 gigabits per
second. Although its speed is faster than USB ports, it is impractical for
low-bandwidth devices. This fact, together with the knowledge that only
Macintoshes include Firewire ports by default, has kept it out of the
mainstream. Because of its superior ability to transfer uncompressed video
from digital camcorders, it is now found in all modern digital camcorders. Most
digital cameras, however, still use USB to transfer images because USB ports
are today standard equipment on computers.
● INFRARED PORT is a connection on a computer that uses IR signals to
wirelessly transmit information between devices such as a PDA and a
computer. It has a range of about 5 to 10 feet. Most handheld devices have
the capability to communicate via IR ports that allow the device to directly
interface with another device to exchange data.
Ergonomics
Unfortunately, few studies have been done on nursing use of computers with most
research concentrating on seated workstations (Nielsen & Trinkoff, 2003). Some
simple things could improve the work environment of nurses who document with or
otherwise use computers. For nurses who are on their feet all day, if they are to chart
at the point of care, they need a way to be able to sit while using the computer. If the
computer is also used by those standing, an adjustable computer stand could be
employed so that a user who is standing does not have to stoop. Additionally, if the
computer is fixed at a height for users who are standing, a stool should be provided
for the nurse who uses the computer extensively. Touch screens and light pens may
be ideal for quick entry, but for extended entries, they are very tiring to the arm.
Providing dual means of entry may solve this situation. Resolution of a screen is also
important. The higher the resolution, the easier the screen is on the eyes. It is also
important to prevent glare on the screen. In situations where this is impossible, it is
possible to purchase screen filters that will cut down the glare.
More thought also needs to be given to how a workstation is designed for those who
will use a computer for more than four hours a day. Consideration needs to be given
to the posture the user will be forced to adopt. The best chairs have adequate
support for the outward curve of the lumbar spine and the inward curve of the
thoracic spine. Studies have shown that a 100 to 110 reclined position is better than
an upright posture (Cornell University Ergonomics Web, 2007). The feet should be
flat on the floor, or a footrest should be provided (Figure 2-3). Wrists, knuckles, and
the top of the forearm should fall into a straight line while typing (Bailin, 1995). To
promote circulation to the lower arm and hand, the elbow angle should be open.
Both of these can be accomplished with a negative tilt keyboard (Cornell University
Ergonomics Web). The monitor should be placed directly in front of the user to avoid
neck twisting. Studies have found that the best position for the monitor is for the
center of the screen to be about 17.5 degrees below eye level and about an arm's
length away. The ideal placement of a mouse is on a flat, movable mouse platform
positioned one to two inches above the numeric keypad.
Laptops, under most use conditions, violate all ergonomic requirements for
computers (Cornell University Ergonomics Web, 2004). This is caused by the
connection between the keyboard, screen, and computer. If the computer rests on a
table, the keyboard will be too high for proper arm positioning. If the computer is
lower, the monitor placement may require that the head be tilted forward for use. For
these reasons, if a laptop is your primary computer, to provide more ergonomic
working conditions you should invest in a docking station. If you carry the laptop and
all the required accessories such as spare battery, power cord, or external drive
weighing 10 pounds or more, consider a wheeled carrying case.
Computerese
Compatibility refers to whether programs designed for one chip will work with an
older or newer chip, or whether files created with one version of a program will work
with another version of the same program. Most computer chips and software are
backward compatible, that is, they will work with older versions of a program or files
created with an older version of a program. Some are not, however, forward
compatible, or the situation in which an older program does not recognize files
created by a newer version of the same program. This is particularly true of
spreadsheets, databases and presentation programs.
Although the term hacker originally meant a person who enjoyed learning about
computer systems and was often considered an expert on the subject, mass media
have turned it into a term to refer to individuals who gain unauthorized access to
computer systems for the purpose of stealing and corrupting data. The original term
for such a person was cracker. Today, differentiations may be made by using the
term white hat hacker for a person who uses his or her computer knowledge to
benefit others. Black hat hacker is the term used for those who use their computer
skills maliciously.
When used with a computer the terms logical and physical refer to where data are
located in the computer. The physical structure is the actual location, whereas a
logical structure is how users see the data. For example, when a user requests
information about laboratory tests, he or she may see the indications for the test, the
normal values, the cost of a test, and the patient's test results. Although this
information may be presented as one screen, which is a logical structure, different
pieces will have been retrieved from different files in different locations, which is the
physical structure of the information.
Another potentially confusing computer term is object. Although the more common
use of the term "object" is for a physical entity, or at least a picture on the screen, to
a computer, an object is anything the computer can manipulate. That is, an object
can be a letter, word, sentence, paragraph, piece of a document, or an entire
document. Objects can be nested, that is, a word is an object nested within a
sentence object. A paragraph is an object that is contained in a document. When an
object is selected, clicking the right mouse button presents a menu of properties of
that object that can be changed.
Networks
A network can range in size from a connection between a palmtop and a personal
computer (PC) to the worldwide, multiuser computer connection - the Internet.
Variation in network size or the number and location of connected computers is often
seen in the name used to denote the network, such as a local area network (LAN) or
a wide area network (WAN). A LAN is a network in which the connected computers
are physically close to one another, such as in the same department or building. A
WAN is a network in which the connections are farther apart. Often, a WAN is an
internetwork of LANs. WANs are sometimes referred to as enterprise networks
because they connect all the computer networks throughout the entire organization
or enterprise.
NETWORK ARCHITECTURE
There are many different variations in how networks are constructed, or what is
referred to as their architecture, often depending on the purpose of the network. For
a home network, a peer-to-peer network in which each connected computer is a
workstation is a normal approach. In this scheme, each computer can have a shared
folder that is accessible by the other computers. Often, the network is primarily for
connecting to the Internet or for sharing hardware such as a printer.
There are other variations for networks. A computer in a healthcare facility may
function as a client for the patient care information system, but may have application
software that allows users to do things like word processing, in which case it acts like
a regular computer. This computer may also be networked to another server that
stores the files created by the networked computer, or the files may be stored on the
computer that was used to create them. This computer may even be connected to
the Internet through another server. Printers are usually connected to a network so
that more than one computer/client can use them. Managing networks is an ongoing
maintenance task performed by the network administrator.
CONNECTIONS
Wireless transmissions are limited in distance, so they do not compete with other
radio traffic. When a wireless system is installed, nodes are placed at strategic
locations throughout the institution, locations that are determined after a thorough
assessment of the building. A node in a wireless connection is a single point on the
network that consists of a tiny router with a few wireless cards and antennas. These
nodes pick up the signals sent by a user and transmit them to the central server, or
even to another node for rebreed-cast, and transmit signals back to the user's
computer. Successful wireless communication depends on an adequate number of
nodes or hardware that send or rebroadcast the signal and on their placement. The
distance of a device from the node will affect both the speed of transmission and
whether one can use the network.
PROTOCOLS
● Definition
●
● A network is a way to connect computers so several benefits can be realized. Local
Area Networks (LANs) connect computers that are physically close together (i.e., in
the same local area). This means not only in the same room but also in the same
building, or in several buildings that are close together. LANs use three things to
connect computers: a physical connection (e.g., wire), a network operating system,
and a communication scheme.
There are several ways to connect computers physically. The most common
method is to use category 5 cable and the latest way uses fiber optic cable
(light is used in place of electricity). The very latest methods are wireless; they
use either radio transmission or infrared light for the connection. Each method
is suited for different situations and is part of the consideration when a
network is built.
There are several network operating systems available today that provide the
necessary processes to allow computers to talk with each other and to share
information and programs. The communication schemes are properly called
protocols. This is a standard method by which the computers in a network to
talk with each other and pass information around. There are three main ways
to connect computers in a network: star, ring, and bus configurations. These
are called network topologies and represent different physical arrangements
of the computers. As with the physical connecting medium, each topology has
its strengths and weaknesses, which must be considered when a network is
built.
● Benefits of a Network
The important benefits of a network are shared information, shared programs,
shared equipment, and easier administration. It is technically possible for any
computer on a network to read and write information that another computer
has in its storage (i.e., its hard disk). Whether that computer is allowed to do
so is an administrative matter. This means, though, that information can be
shared among the computers on the network. Programs can also be used by
computers on the network, regardless of where those programs are physically
stored. It is also possible (and usually desirable) for computers on a network
to share equipment such as printers.
Technically, any computer on the network can print its information on a printer
that is physically connected to another computer somewhere else. By sharing
expensive office equipment, an organization reduces its expenses. Finally,
administration of computers on a network is simplified because all the other
computers can be examined, helped, and maintained from one computer.
Wide Area Networks
Wide Area Networks (WANs) are extensions of Local Area Networks. There are two kinds
of WAN. The first one attaches or connects a single computer to a preexisting LAN; this
kind is called "remote LAN attachment." The second one connects, or "bridges," two or
more preexisting LANs. Both WANs allow a computer to use information or equipment no
matter where they are located in the organization. An interesting point about WANs is the
options that can be used to connect the LANs. Instead of being limited by the length of
cable that can be placed between computers, WANs can communicate via satellite and
earth stations. This literally means that a person could be using a computer in Africa and
working with information that is on a computer in Iceland—without knowing or caring about
its origin. To that person, the information appears to be on his or her computer.
● Open Systems
"Open systems" is the idea that it should be possible to do two things: run a
particular program on any brand of computer and connect any collection of
computers together in a network. However, because of the development of
computer technology, this is difficult to accomplish.
Most computers were initially developed as "closed" systems; that is, a
manufacturer built the computer, wrote the operating system, and wrote the
application programs to run on the computer. Each computer manufacturer
saw tremendous sales advantage from this strategy. The result was several
computers that were similar in function but very different in how those
functions were executed. It was not easy to buy an application program
from a vendor and run it on two different brands of computers. It was a
torturous exercise to get any two computer brands to "talk" with each other.
For people who simply want to buy and use computer technology, "plug and
play" is the ideal mode. This means that a computer could be purchased
from vendor X, a second computer from vendor Y, a program from vendor Z,
and a printer from vendor A, and all these parts could be connected and
used with the same ease that people expect with stereo system
components. The way to achieve this ideal is through standards. Just as
stereo components are built to use a standard voltage, produce or use a
standard type of signal, and connect with standard plugs and cables,
computers and application programs need to use certain standards for
communication protocols and file access. This "plug and play" mode is
getting closer today because of vendors and manufacturers' support and
adoption of standards.
● Client/Server Computing
As we have seen, computers come in a variety of sizes and with various
processing capacities. Some computers are better suited than others for
different tasks. For example, personal computers, because of the physical
size of their hard drives, have a limit to their storage capacity. On the other
hand, the large, mainframe-type computer was designed to handle
tremendous amounts of information and therefore has large storage
capacity. Where does it make more sense to store a large data set?
● This brings us to client/server computing. The essence of "client/server computing"
is to assign to each computer the tasks for which it is best qualified or, in other
words, to use the right tool for the job. Capitalize on the strengths of one computer
for task A and use a different computer more suited for task B. A personal
computer works well with people; it is fast and has color and good graphics display
capability. It could be the primary interface device for people and computer
systems. Mainframe computers have huge storage capacity, great speed, and
large processing power. This could be the place to store, process, and retrieve
information from the vast amount of data accumulated by a large organization. In a
network, client/server computing makes sense.
● Remote Access Computing
● Computers can be connected together in a network; but, increasingly, mobile
computing requires that computers be able to access and connect to other
computers from almost anywhere. This is possible through the use of telephone or
cable systems and special computer communication devices called modems.
"Modem" is short for "modulate-demodulate." The computer that, at the moment, is
sending information uses its modem to "modulate" its electronic signal into a form
that can be carried over the telephone or cable system; the computer receiving that
information uses its modem to "demodulate" the signal. Information can be
exchanged at speeds that allow effective long-distance computing.
Short Cuts and Tips
This is a small section of miscellaneous short cuts and computer navigation tips.
They are in no particular order, but will help you as you go along in your computer
learning.
JPEG Files
If you scan a photo into a .jpg file or .jpeg file, many times you will find that it is too large
[too many pixels] to use on public sites [like MySpace, eHarmony and others] where you
would want to use it. The quick way to solve this issue is to resize the .jpeg file using one
of the online services such as Shrink Pictures. Simply go to:
http://www.shrinkpictures.com/ and follow their directions. When you finish shrinking and
saving your new .jpeg file, their page gives you an option to delete the file from their server
which makes the entire practice fairly safe as far as services on the internet.
Acrobat Reader
You will not be able to read an Adobe Acrobat file without the current reader. Since
Acrobat is one of the more popular files used on the internet, this will prove to be an
essential part of your computer system. Acrobat files are all the files you will ever see
which have a file name extension [the part of the file name on the other side of the period]
of .pdf . To download the current Acrobat reader, go to:
http://www.adobe.com/products/acrobat/readstep2.html
Reboot
If the computer is still on, the easy way to reboot is to quickly and sequentially press your
CTRL + ALT + Delete keys on your keyboard. This is the most common reboot command
to give a personal computer. If the computer is not on, then reboot will occur when you
turn it back on.
Text File
If you copy text from something on the internet because you intend to post it in another
place, the best file to save it to is a .txt file. In the Windows programs, the .txt files can be
created in Notepad usually under the Accessory panel under your Start button. The
reason .txt is the best file to save to is because when you go to copy and paste the
content to another site, document or format, all of the previous program's formatting will be
stripped out of it and will not confuse the new site or document. In other words, you will
transfer only content, not programming. You can then easier re-format the text to fit the
current program you choose to use.
Virus
When using email, use an email system that will first scan your incoming attachments for
viruses. If you open an email attachment and it contains a virus, then you will have to
clean your entire computer.
The quickest way to tell if you are on a "secured" page is to look at the top of your page for
an "s" in the internet address line. The "s" should appear behind the "http" and before
the colon. Example: The Pay Pal site is https://www.paypal.com. If there is no "s" in this
location on the address line, then you are not on a secured page regardless of what the
page states in its content. If you post your personal data to such a page, then you are a
sitting target for identity theft. This is another common way online thieves phish for your
credit card information and personal identity; they make an exact copy of the real website,
but they change the address by one or two characters leading you to believe it is just
another page of the real site so you will disclose your information. Look for the "s" in the
address line behind the http.
Your Online Pseudonym
It may be best to establish a pseudonym for yourself, complete with an assumed date of
birth, mailing address and phone number. For many folks this can be accomplished with a
PO Box and a cell phone number. The point is that the fewer places you put your real
information, the more secure you are on the net and less likely someone could use your
information for gaining false credit or purchases.
File Saving Tip
When you save any file in your hard drive, you want to be able to easily locate the file at a
later date. You will eventually have files in your drive that are older, outdated or have
limited current use for you. Over the years I have created shortcuts for myself in the file
name. Some of those short cuts include:
1. business acronym in file name;
2. addressee's initials in file name;
3. version of the document in the file name; and
4. date of the file's creation in the file name.
Example:
This is the third version [or third edit] of the original document
-----------------------------------------------------------------------------------
XYZ.JS.v.3.Business Plan.033108.doc
At a glance in my file directory I can later tell the "who, what, when and document type" of
the file. This helps to later sort files according to timing and relevancy without having to
open lots of files to find the most recent or most appropriate file.
To help you quickly identify file types, this is a small list of the most common types of file
extensions used in file names, and which program they indicate has been used by the file
creator:
● .doc – MS Word
● .pdf – Adobe Acrobat
● .xls – MS Excel
● .rtf – [rich text file] – created most often in Word – keeps the document formatting
[such as fonts, sizes, layout, etc.]
● .jpg – [a.k.a. jpeg] – created in a JPEG supported program
● .txt – [text file] – created most often in Notepad or similar tool of Microsoft – strips
out the document formatting.
ICE – In Case of Emergency
This lesson is a small run down of how to handle emergency issues which can
occur. The ones listed here are those that are most likely to create panic for new
users. Techniques to solve each problem are offered; if they do not work in your
situation, then you will need to seek a local geek to help you.
Every computer has an OS disk to use for reboot in cases where a crash happens.
Always insert your OS CD/DVD to reboot if your computer doesn't start up as
normal. If you are using a laptop or a PDA and are away from your disk source,
then you will need to take other measures to reboot in cases of emergency.
● Windows – When you turn your computer on, immediately begin pressing your F8
key repeatedly until a screen pops up. When the screen pops up it will give you
several options. You want to select Restart in Safe Mode. This will allow the
computer to reboot and start up [so you can find your document(s) on the spot].
You do not want to create documents in Safe Mode, and you do not want to
perform any complex tasks while on the blink. When you return home, or wherever
you have your OS disk, then you can use it to reinstall your OS if necessary.
●
MAC – To reboot in Safe Mode on a Mac, hold down the Shift key as you reboot,
or hold down the "S" key to reboot in Single User Mode to look through your files
and find your problem. If you are away from home, it is best to wait until you have
access to your OS disk before digging through the files to find the problem.
Computer takes too long to move/think
If your computer sounds like it is grinding or thinking and it takes too long to move
from one point to another, then you have system problems. The specific problem
referred to here will prevent you from opening a document, or it will take 15
minutes for the system to boot up, or some similarly extreme delay in achieving
your decided command to the computer.
● You have contracted through the internet, or through another person's file which
you have opened, a virus, Trojan, worm or some other destructive tool and it has
corrupted your computer's OS. In this instance, the virus or worm, etc. is achieving
its goal. You will have to immediately run a clean up program on your computer or
risk it freezing up completely. Programs such as Ghost or Norton 360 provide ways
to regularly backup your work, so you should already have your information
secured and available for emergency retrieval. If you haven't installed a program to
backup your data, then you may lose your documents. The first thing you should
do is reboot in Safe Mode, and then perform a virus scan in your system. Most of
the antivirus and firewall products now have a systematic way to isolate viruses in
your system. Use this program tool and you should get back to normal.
●
You have installed a program or tool that requires more RAM than your system
currently has on it. Large or complex programs use a lot of RAM when your system
is up and running, and even more when the particular program is open and being
used. Too little RAM will freeze up your system. For today's home computers and
small business computers, the very minimum RAM a system should have is
512MB. If you install between 2GB and 4GB of RAM on your system, then you
should be somewhat safe from RAM freezes. Keep in mind that the amount of
RAM your system can safely hold is determined by the computer's motherboard
and processor. If you are running on say an older Pentium III processor, then the
most your motherboard will operate with is 512MB of RAM. On the Windows
system, you can find your processor and RAM information by clicking through the
Start button, and then the following sequence of clicks: Settings/Control
Panel/Administrative Tools/My Computer/View System Information/General Tab. At
the bottom of the General Tab is the information on your processor and RAM.
Close out of these by clicking the X in the top right corner of each box. This
process is for viewing only. Do not make any changes to anything when you open
this up to find it.
The good news about RAM is that it is fairly inexpensive to purchase [about $60
per 512MB]. The bad news is that unless and until you become fairly experienced
with opening up your computer and making hardware changes to it, you will need
to pay a service center to install the RAM so that you do not inadvertently fry your
motherboard or the RAM. This is one area where it is good to heed the warning: If
you do not know anything about the insides of a computer, then do not attempt to
install the RAM.
Other Emergency Cases
If your data or visual changes from vertical to horizontal, then you most likely have
given your computer conflicting commands. This can happen when trying to use
the CTRL + ALT + Delete sequence for rebooting. If you accidentally hit any other
buttons, you may mess up your display screen. If you find you are reading your
screen sideways, then use the command CTRL + ALT + Up Arrow, and your
visuals should return to normal.
The first thing to do is try to reboot. If after rebooting you still cannot get your
programs to come up, then you have most likely experienced a hard drive crash.
The drive will either need repair or replacement. Either way, you will need a tech to
help fix the problem and to extract or recover your files. This is a time to find your
backup CDs.
You are disconnected from your internet. Usually this will happen from traffic in
your computer area. People will tend to trip over and disconnect your Ethernet
connection. If you have kids, it is especially good to tack up your Ethernet wire out
of the main traffic area; be sure not to use a staple gun on the Ethernet cable as
you could short out your internet services. If you experience the no signal sign in
your window often, then it could be because you have a very long cable from your
box to your computer or it could be that you have a faulty Ethernet cable and it
needs replacing.