Chapter One
Why computers matter to you: becoming computer literate
Computer literate: means being familiar enough with computers
that you understand their capabilities
and limitations
Benefits of becoming computer literate:
Avoiding hackers and viruses
Protecting your privacy. (credit card info.)
Understanding the
real risks. (cookies vs firewall)
Using the Internet and the Web wisely. (finding good information)
Avoiding online annoyances (spam)
Being able to maintain, upgrade, and
troubleshoot your computer
Finally, becoming computer literate
means knowing which technologies are
on the horizon and how to integrate them
into your home setup when possible
Information
technology (IT) is a field of study focused
on managing and processing information
and the automatic retrieval of information.
Information technology includes computers, telecommunications, and software
deployment.
Jobs in the computing industry:
Retail: data mining the process of searching huge
amounts of data with the hope of finding a
pattern, Data mining is the art of
combining huge volumes
of raw data into views that
provide insight.
Register terminals: determine which products
are selling on a given day and in a specific
location.
Getting information from people and selling products to them,
Business: Data on the Go
How a MaxiCode sticker label, contains all the important
information about the package (class
of service, destination, etc.).
Bluetooth: works by transmitting radio waves to a terminal, the terminal then sends the data across a
wireless network where it is recorded in the UPS (company of example) database
Arts: Ink, Paints, and a Notebook
Creating websites to sell art, and creating new wats to sell new performances to audiences.
Using computer programs for art, adobe illustrator, photoshop, and corel painter
Using computers to make programs that create art
Video Game Design: A Long Way Down from Pac-Man
Requires complex understanding of game development software like 3ds Max
Education: Teaching and Learning
Teachers can give students virtual tours of museums around the world
Teachers need to be more tech savy than students and use programs to teach courses
Law Enforcement: Put Down that Mouse
Using computer software and equipment to solve crimes, such as facial recognition software, using
information databases
Computer forensics is a growing career path, where focus is on illegal actions on the internet
Dr. Paul Ekman created a program that recognizes small micro-expressions in the face to determine
emotions of an individual
Computers Migrate into the Living Room
Setting up a digital home means having an appropriate
computer and digital devices that are all connected to a home network.
Tv tuner: receiving channels of tv onto the computer
Blu-ray, DVD, and CD players and recorders
Network Adapter
Network
Internet ready digital television
OLED organic light emiting diode
Military Careers:
Universal remote Drive that Drone
The ASVAB (Armed
Services Vocational Aptitude Battery) exam is
a requirement for entry into the U.S. armed
services,
Using UAV’s unmanned aeriel vehicles, or drones
Agriculture: High-Tech Down on the Farm
Ranchers must look out form disease outbreaks, so they use RFID tags (radio frequency identification
tags), it’s a small microchip in the cows ears.
Cranberry growers have automated water pumps that keep the crop from freezing
Automotive Technology: Sensors and CPU’s
Environmental and governmental regulations are pushing manufacturers to create more fuel efficient cars.
Cars have more sensors now to determine amount of fuel to spray into cylinders, same with braking
systems
Medicine: Technologies of Today and Tomorrow
BrainGate software which translates thoughts into commands for robotic limb
Computer simulation of emergency experiences with mannequins
Replicating human body parts
Robot surgery
Medicine: The Chip Within
Combining biology and technology
VeriChip, chip that identifies a person by transmitting itself with radio waves
Hitachi has a u-chip
Science: Stimulating Reality
Tornado forecasting
Recreating ancient sites like pompei with scans
Sports Science: Compute Your Way to a Better Game
Using analyzing computer technology to increase athlete’s performance, such as golfing and swimming
where technique is everything
Nanotechnology: Careers Yet to Come
Nanoscience involves the
study of molecules and structures (called
nanostructures) that range in size from 1 to
100 nanometers.
Currently used for clothing to repel water, stains, and wrinkles
Psychology: You Should Smile…Now
Affective computing is computing
that relates to emotion or deliberately
tries to influence emotion.
One project to emerge is the emotional social
prosthesis (ESP) device developed by a
group at the MIT Media Lab. The ESP system
is targeted at helping people who have
autism.
Knowledge is Power
The discrepancy between the haves and have-
nots with regard
to computer technology is commonly referred
to as the digital divide.
Chapter Two: Looking at Computers, Understanding the Parts
Understanding Your Computer
Computers are data processing devices
1. It gathers data, or allows users to input
data.
2. It processes that data into information.
3. It outputs data and information.
4. It stores data and information.
What is the difference between data and information?
Data: is the representation of a fact, figure, or an idea. (can be a number word, pircutre, or sound)
(input)
Information: is data that has been organized or presented in a meaningful fashion. (output)
How do computers interact with data and information?
Computers gather data and create a finished display of useful information such as an id card.
Bits and Bytes: The Language of Computers
How do computers process data into information?
They use binary language which consists of 1 and 0s.
Each 1 and 0 is a binary, 8 bits make a byte
What else can bits and bytes by used for?
How does your computer process bits and bytes?
Hardware: any part of the computer that you can physically touch
Software: computer programs that allow the hardware components to perform different
tasks
Application software: set of programs that you can use on a computer to help you carry
out tasks such as writing a research paper
System software: the set of programs that enables the computer’s hardware devices and
application software to work together.
Operating system (OS): the program that controls the way in which your computer
system functions (monitor, mouse)
Your Computer’s Hardware
Are all computers the same?
Two types of basic designs of computers: portable and stationary
Portable: netbook, laptop, tablet pc (touch screen)
Stationary: desktop computer, includes peripheral devices (attachments: mouse,
keyboard), all-in-one with everything in the monitor)
Are there other types of computers besides desktop and notebook computers?
A mainframe: large expensive computer, that supports many users
simultaneously
A supercomputer: specially designed to perform complex calculations extremely
rapidly, for only a few tasks but quickly
An embedded computer: self-contained computer devices that have their own
programming and typically do not receive input from the user (ex. Car, thermostat)
Input Devices
Keyboard: enter typed data and commands
Mouse: enter user responses and commands
Microphones
Stylus: an input device that looks like a sketchpad and pen
Keyboards
Aren’t all keyboards the same?
Standard QWERTY keyboard, designed to slow typewriter people down to prevent mistakes
Dvorack keyboard: places common keys together as home keys
How do notebooks keyboards differ?
Sometimes fewer keys or they are arranged on top of other keys with the combination of a (fn)
button
What if the standard keyboard doesn’t work for me?
Flexible keyboards
Laser keyboards
How can I use my keyboard most efficiently?
Numeric keypad
Function keys (f1)
Control Key, performs shortcuts and special tasks
Windows key, specific to the windows operating system
What are some other features on keyboards?
Cursor control key/ arrow key
Insert key, when off it overwrites
Are all conventional keyboards connected to the computer via wires?
Wireless technology uses radio frequency (RF)
Mice and Other Pointing Devices
Optical mouse, uses laser doesn’t need mouse pad
Trackball mouse, ball on the top
Do notebook computers include a mouse?
They have a touch pad, track point device
Are there wireless mice?
Yup
What else can I do with my mouse?
Magnifier
Customizable buttons
Web search (highlight stuff and search it online)
File storage
What other input devices are used with games?
Touch Screens
How else can I input data and commands?
Image Input
How can I input digital images into my computer?
How do I capture live video from my computer?
A webcam
What is ethical computing?
Ethical Computing Guidelines
1. Avoid causing harm to others when using computers.
2. Do not interfere with other people’s efforts at accomplishing work
with computers.
3. Resist the temptation to snoop in other people’s computer files.
4. Do not use computers to commit theft.
5. Agree not to use computers to promote lies.
6. Do not use software (or make illegal copies for others) without paying
the creator for it.
7. Avoid using other people’s computer resources without appropriate
authorization or proper compensation.
8. Do not claim other people’s intellectual output as your own.
9. Consider the social consequences of the products of your computer
labour.
10. Only use computers in ways that show consideration and respect
for others.
Sound Input
Why would I want to input sound to my computer?
What types of microphones are available?
Desktop microphones
Omnidirectional (sounds from everywhere), unidirectional microphones
Clip on/ lavlier microphones
Close-talk microphones (speaking with someone)
What input devices are available for people with disabilities?
Maltron keyboard (one hand)
Trackball
Head direction sensor
Output Devices
Output devices enable the sending of processed data out of the computer
Monitor/display
Printer
Monitors
What are the different types of monitors?
LCD (liquid crystal display) (flat-panel monitor)
Monitors no longer have cathode ray tube (CRT) monitors
Legacy technology stuff that is no longer popular
How do monitors work?
Through pixels, the small dots which are composed of three sub pixels that are red, blue, and
green.
LCD’s have a second layers, and newer televisions have yellow
Light shines through pixels that are moved by electric current and we see the desired colour
What factors affect the quality of an LCD monitor?
Aspect ratio: width to height proportion of the monitor 4:3
Screen resolution: clearness or sharpness of the image 1600X1200
Contrast Ratio: measure of the difference in the light intensity between the brightest white and
the darkest black. 400:1 and 1000:1 is preferable
Viewing angle: the measurement in degrees of how far to the side of the image you can move
before the image quality degrades to unacceptable levels. 150 degrees is usually
recommended.
Brightness: measured as candelas per square meter (cd/m2) or nits, brightness is a measure of
the greatest amount of light showing when the monitor is displaying pure white of 300cd/m2 or
greater is recommended
Response Time: ms. of how long it takes for pixel to change color, a quicker time produces a
more smooth image quality
Is a a bigger screen size always better?
Yes!
What other features should I look for in an LCD monitor?
Multiformat card reader, USB port
How do I show output to a large group of people?
Projector
Printers
What are the different types of printers?
Inkjet and laser
Impact printer that uses hammer to put ink on paper, the dot-matrix printer was the most
common
Today we have non-impact printers
What are the advantages of inkjet printers?
Inkjet printer most common in the home, they work by spraying tiny drops of ink onto the paper
Why would I want a laser?
Faster printing speed, and produce higher quality printouts
Laser printers uses laser beams and static electricity to deliver toner
What kind of printer can I take with me?
Portable printers
Are there wireless printers?
Wifi and BlueTooth printers
Wifi is quicker
Are there any other types of specialty printers?
All-in-one printer: combines the function of printer, scanner, copier, and fax
Plotter: produce large prints, and detailed images
Thermal printer: works by melting wax based ink onto ordinary paper, the process is called
thermal wax transfer printing, or direct thermal printing (used for receipt printing)
How do I select the best printer?
Speed: ppm 8-38
Resolution: image clarity, measured in dots per inch (dpi), the greater the better
Color output: Inkjet printer with four color printer (cyan, magenta, yellow and black), or 6 ink, or
just 2
Laser printers have 4 separate toner cartridges, and the toner is blended in various quantities to
produce the entre color spectrum
Use and cost of the printer:
Large volumes and sharing: black and white laser printer
Duty cycle: the number of printed pages the printer can reliably produce on a monthly basis. It’s
the manufacturers figure to how long the machine can run before it needs a rest, or what
percentage of time it’s supposed to be in use.
Cost of consumables
Consumer report magazines can help evaluate what the best printers are
Sound Output
What are the output devices for sound?
Speakers, surround sound speakers, sub-woofer (low base speaker), ear phones
Processing and Memory on the Motherboard
Motherboard includes the processor, memory
Motherboard is located in the system unit (tower)
What’s on a motherboard?
CPU (central processing unit), ROM and RAM cache, also houses room for expansion
cards/adaptor cards, that offer additional functionality
Expansion cards: sound card, video card, modem card, network interface card (NIC) (cable
internet), USB firewire ports
Memory
RAM random access memory: used for quickly taking and storing information, its therefore a
volatile storage location because all the information gets erased when the computer is shut off
Does the motherboard contain any other kinds of memory besides RAM?
ROM read only memory, has all the instructions the computer needs when it starts up, it is non-
volatile
Processing
What is CPU?
Central processing unit (brains)
How is processor speed measured?
Hz hertz, machine cycles per minute, the CPU decodes the instructions into something the
computer can understand, and then executes them and stores the results back into its memory
Older machines ran at megahertz (MHz), today they run at (GHz)
What else determines processor performance?
The number of cores a processor has 2,4,8
Besides the number of cores, are there other factors that determine processing power?
Cashe memory, front side bus (FSB), determines how fast data is exchanged between the CPU
and RAM
Storing Data and Information
Internal drive bays cannot be seen, it holds all permanently stored programs and data
external drive bays: can be seen and accessed such as cd/dvd drives
Hard Drives
Which storage device holds the most data?
The hard drive which is non-volatile storage device
Are all hard drives located inside the system?
No, external hard drives can be purchased
Optical Storage
What other kinds of storage devices are available?
Hard drives store their data on magnetized platters
Optical drives read cd’s dvd’s or blu-ray disk, they work by little pits being etched into the cd
Flash Storage
Flash drive/jump drive/ USB/ thumb drive
Flash memory card
Solid state drive (SSD) does not create noise, emit little heat, are faster and powerful, as they
don’t need any spinning platters or motors
Connecting peripherals to the computer
Port: place to attach a peripheral device
High-Speed and Data Transfer Ports
What is the most common way to connect devices to a computer?
USB universal serial bus port
What are the other types of ports?
Firewire, portable music players connect through this
Connectivity and Multimedia Ports
Which ports help me connect with other computers and the Internet?
Connectivity port: gives access to the internet, Ethernet port
Can connect the computer to a DSL (digital subscriber line), modem, or network
How do I connect monitors and multimedia devices?
VGA (video graphics array) port is the port to which CRT monitors connect
VGA ports
DVI (digital video interface)
S-Video (super video ports)
How do I connect my computer to TV’s and gaming consolers?
High definition multimedia interface (HDMI), carries both high definition and uncompressed
digital audio on one cable (DVI carry’s video signals)
Adding Ports: Expansion Cards and Hubs
What if I don’t have all the ports I need?
You can add them to open expansion card slots on the motherboard
What if there are no open slots on the motherboard when I can insert an expansion card?
An expansion hub can be added
Power Controls
What’s the best way to turn my computer on and off?
Cold boot: starting a computer in the morning
How do I power down a computer properly?
Shut down on the computer
Should I turn off my computer every time I’m done using it?
Not really, the computers today are more environmentally efficient
Can I “rest” my computer without turning it off completely?
Sleep and hibernate
Sleep mode: all documents remain in RAM
Hibernate: saves information to hard drive
What’s the restart option in Windows for?
Warm boot: restarting the system while it’s powered on
Setting it all up
Ergonomics: an applied science concerned with designing and arranging things people use so
that the people and things interact more efficiently and safely
Why is ergonomics important?
Carpel tunnel syndrome and tendonitis
How can I avoid injuring when I’m working at my computer?
Position your monitor correctly: 25 inches away from the eyes, and at eye level or 15 to 20
degrees below eye sight
Purchase an adjustable chair: feet are on the ground
Assume a proper position while typing: repetitive strain injury (RSI) caused by repetitive or
awkward movements of a part of the body
Take breaks from computer tasks: focus on an object at least 20 feet away for a little while
Ensure the lighting is adequate: eliminate glare
Is ergonomic important when using mobile devices?
Chapter 3:
Using the Internet:
Making the most of the Web’s resources
The Internet
Was created to respond to these two concerns: establishing a secure form of military
communications and creating a means by which all computers could communicate.
Who invented the Internet?
“internetworking” project called the Advanced Research Projects Agency Network (ARPANET)
So are the Web and the Internet the same thing?
The web is only one component of the internet
Did the same people who invented the internet invent the web?
Tim Berners-Lee created the web browser in 1989
How much has the Internet grown?
Explosive growth in mid-1990’s 1997 access was global
Communicating Through the Internet E-Mail and Other Technologies
E-mail
Why did the E-mail catch on so quickly?
Fast and convenient, reduced cost
Is e-mail private?
No it is open and the messages are archived for later use in a lawsuit or investigation
How do I write a good e-mail?
Being concise, avoiding text abbreviations, signature line
What do I need to send and receive e-mail?
Computer, internet connection, e-mail account
Are there different types of e-mail accounts?
E-mail clients: office outlook that act like a post office for different mail for different accounts
What are the advantages of a Web based e-mail account?
More versatile
Why would I need a client-based e-mail program?
Can access mail from many different email accounts
Instant Messaging
What is instant messaging?
Real time communication with others
Group Communication
What kind of online group communication exists?
Internet Relay Chat (IRC), used for chat in discussion rooms
Are there rules for group communications?
Netiquette
Flooding: spamming
Using all caps= shouting
Web 2.0 Technologies: Collaborating and Communicating Through the Internet
Web 2.0 evolved type of Web interactions between people, software, and data
What is social networking?
Friends and family communicate ideas, information
Is social networking just for fun?
Linkedin offers a more formal network
Are there precautions I should take with my social networking content?
Yes, there are hackers and others who distribute or misuse your information, and your content
reaches places it shouldn’t be
Weblogs (Blogs) and Video Logs (Vlogs)
What is a blog?
Easy to make, they are usually written by one author and several entries are listed on a page, it
is open to the public
A vlog is a personal journal that uses video as the primary content, can also contain text,
images, and audio
Why should I want to create a blog?
As personal scrapbook, or contain a particular topic such as movies
How do I create a blog?
Free blog hosting sites such as blogger.com or create your own website for a blog
Are there any problems with blogs?
Spam blogs (blogs) filled with fake articles and stolen text (tactic known as blog scraping)
Wikis
What are wikis?
A type of web site that allows users to change its content by adding, removing or editing the
content, they can be used to express thoughts and opinions about certain topics, it’s a
“common” opinion (ex. Google doc)
What are wikis used for?
Collaborative learning in online courses, modify just one document
How accurate is Web content that anyone can change?
Can be accurate or not, depending on the group who verify the information
Podcasts and Webcasts
What is a podcast?
A podcast is a clop of audio or video content that is broadcast over the Internet using
compressed audio and video files, they might include radio shows, audio books, magazines and
even educational programs
Broadcast is a combination of broadcasting and IPod (IPod because it’s the most popular PMP
portable media player)
So what makes podcasting different from just listening to an audio file on the computer
or PMP?
Podcasts come to you through syndication
While PMP you have to look for them
Podcasts are possible because of RSS technology
What is RSS?
Really Simple Syndication (RSS)
XML-based format facilitates the delivery of frequent content upgrades on Web pages
Made so that aggregators (programs that go out and grab the latest updates of Web material)
can find and download only the new content to your computer
Where can I find podcasts?
Newspapers, radio sites, tv news, iTunes, YouTube
Can I create my own podcast?
You need a computer, microphone, web cam for video podc, additional software, and creating
an RSS feed, and uploading it to the web.
What’s a webcast?
A webcast is a broadcast of audio or video content over the internet. It is a one-time event
Webcasts can include non-interactive content such as simulcasts of radio or TV broadcasts.
Web Entertainment: Multimedia and Beyond
Advanced audio coding (AAC)
Multimedia: anything that involves one or more forms of media in addition to text
What are streaming audio and video?
Streaming audio continuously feeds an audio file to your browser, its better than waiting to
download an entire file before using it
What kinds of games are played on the Web?
Multiplayer online games
Massive multiplayer online role-player games (MMORPG)
Do I need anything besides a browser to view or hear multimedia Web?
Plug-in: (or player) a special software program that allows you to use a certain media
Do I need to update players and plug-ins?
Yes, you’ll get notified
Are there any risks with using plug-ins?
Yes, with automatic downloading of plug-ins
Is there any way to get to multimedia Web content to load faster?
Yes, through a cache (temporary storage place) where website information is stored
Conducting Business over the Internet: E-commerce
E-commerce or electric commerce
Selling or advertising
Are there different types of e-commerce businesses?
Click and brick: stores physically and online at the same time (ex. Best buy)
Business to consumer (B2C)
Business to business (B2B)
Consumer to consumer (C2C) ex. Ebay
What are the most popular e-commerce activities?
Buying stuff…
E-commerce Safeguards
Just how safe are online transactions?
Companies hire security companies like VeriSign to create safe websites with https://
The s stand for secure socket layer
How else can I shop safely online?
Shop at well known, reputable sites
Avoid making online transactions when using public computers (they can record your key
strokes)
Pay by credit card, not debit card, credit cards have laws to protect the users
Check the return policy: print and save
Accessing the Web: Web Browsers
Web browser allows you to navigate the web
What are some common Web browsers?
Internet Explorer (IE)
Firefox
Safari
Google Chrome
What features do browsers offer?
Tabbed browsing, quick bar, popular websites
Getting Around the Web: URLs Hyperlinks, and Other Tools
URL: uniform resource locator
What do all the parts of the URL mean?
The protocol (set of rules) used to retrieve the specific document
Domain name is also host name
What’s the protocol?
HTTP: hypertext transfer protocol, it is the protocol that allows files to be transferred from a Web
Server
FTP: file transfer protocol, used to download files from the computer to a Web Server.
Ftp file server, http web server
What’s in a domain name?
Identifies the site’s host
Top level domain: the organization to which the host belongs to
What’s the information after the domain name that I sometimes see?
The subdirectory, it identifies each subpage that is visited
Hyperlinks and Beyond
What’s the best way to get around in a Web site?
Hyperlink: specially coded element that sends you to different pages
How do I return to a Web page I’ve already visited?
Breadcrumb trail: a list of pages within a Web site you’ve visited, you use the back and forward
buttons to navigate the trail
Favorites, Live Bookmarks, and Tagging
What’s the best way to mark a site so I can return to it later?
Favorites or bookmarks
What are live bookmarks?
Live bookmarks, the web page RSS feeds come to you, if you want updates in news, sprots,
etc.
What is social bookmarking?
Social bookmarking also known as tagging, allows you to store, organize, and manage
bookmarks or tags of Web pages
Searching the Web Effectively
Use a search engine, a program that searches the web for keywords
Subject directory can also be used, which is a structured outline of a Web’s sites organized by
topics and subtopics
Search Engines
How do search engines work?
First part is a spider; it collects data on the Web with the keywords
Second part is the indexer program which organizes the data into a large database
Third part is the search engine software, it pulls out relevant data according to your searches
The results appear as hits
Why don’t I get the same results from all search engines?
Each search engine uses a unique formula/algorithm to create the results
Some rank their results on frequency of the appearance of the word
Can I use a search engine to search for images and videos?
Youtube
How can I refine my searches for better results?
Originally Boolean operators were needed to help redefine search (are words such as AND
NOT OR that describe the relationship between keywords in a search)
You can narrow your search
Are there other helpful search strategies?
Search for a phrase (in quotes)
Search within a specific Web site: type a keyword then site:
Use a wild card: “*” for unknown terms
How else can I customize my searches?
Clicking the “more” hyperlink
Going on the different types of searches that Google offers
Evaluating Web Sites
How can I make sure a Web site is appropriate use for research?
Authority: who published it?
Bias: most sites use a biased point of view to sell stuff, so use multiple sources
Relevance: is the information current
Audience: ensure the content, tone, and style match your needs
Links: are the links available and appropriate?
The Internet and how it Works
How does the Internet work?
A computer is either a client (asks for data), or a server (a computer that receives requests and
returns data)
This is a client/server network
How do computers talk to each other?
Main pathways of the internet travel are called the internet backbones
How does the data get sent to the correct computer?
Each time the computer connects to the internet it is assigned a unique identification number, its
called an Internet Protocol Address or IP address.
The IP address is commonly a dotted quad or dotted decimal with its four numbers
Connecting to the Internet
Dial-up internet is becoming legacy technology
Broadband Connections
What is broadband?
Often refers to as “high speed internet”
What types of broadband are available?
Digital subscriber line (DSL), standard phone line
Cable, which uses the television’s cable
Fiber-optic service uses glass cables
Satellite broadband
How does cable work?
Cable is a one way service for the tv, in order for the internet to work
cable companies must upgrade their networks with two-way data transmission capabilities
How does DSL work?
Uses phone lines, and allows for phone and data transmission to share the same line
Phone lines are made of pairs of twister copper wires known as twister pair wiring
Three cables, one for phone, and the other 2 for internet in receiving and sending data
Can anyone with a phone line have DSL?
Phone companies must upgrade their wiring to the new technology
What are the limitations to DSL and cable?
DSL signals are sensitive to distance
Cable services are slower when many users are using it, as it packs up the cable traffic
How does fiber-optic service work?
Strands of optically pure glass or plastic which are arranged in bundles called optic cables and
transmit data with light which makes the speed so fast. The computer reads the light through
electrical pulses
What special equipment do I need to hook up to broadband?
It require a modem, it translates the broadband signal into digital data and back again
Sometimes DSL filters are needed to reduce interference caused when the DSL equipment
shares the same lines as the standard phone line
The modem is connected to a network interface card (NIC) in the computer
What options exist when cable and DSL are not available?
Satellite internet, which requires a satellite dish
Wireless
Why is wireless Internet access necessary?
Because… how else am I going to pwn noobs on MW2!
How does one access the Internet wirelessly?
Need a Wi-Fi spot (wireless fidelity)
Aircard/ cellular modems, placed in Express card slot, which allows the user to have wireless
internet access with notebooks and netbooks
What are concerns with wireless?
Most hotspots are unsecure, don’t use credit card
Dial-Up Connections
How does dial-up connection work?
Needs a phone line or modem (modulate/demodulate)
A dial-up modem converts (modulates) the digital signals the computer understands and also
has to translate (demodulate) the received information
What are the advantages and disadvantages of dial-up?
Its cheap, but its slower than walking to the library
Choose the right internet connection option
How do I choose which Internet connection option is best for me?
Speed: data transfer rate (speed at which data travels between computers), also known as
connection speed
The future of the Internet
More bandwidth!
Large scale networking program and Internet2
What are the large scale networking and internet2 programs?
LSN: looking at increasing speeds of the internet
Internet2: looks at the new possibilities of the internet
How else will the Internet become a more integral part of our lives?
Four: Application Software
The nuts and bolts of software
What is software?
Application software: anything but system software
System software: helps run the computer
Productivity Software for Home and Office
Productivity software: word, excel, PowerPoint, personal information management
programs (PIM)
Word Processing Software
What is the best software to use to create general documents?
Microsoft office, and corel
Are there free or more affordable alternatives?
Open source software programs
Proprietary software
How do I control the way my documents look?
What special tools do word processing programs have?
Spreadsheet software
Why would I need to use spreadsheet software?
How do I use spreadsheet software?
Text
Values
Formulas
Functions
What kinds of graphs and charts can I create with spreadsheet software?
Any…
Are spreadsheets used for anything besides a financial analysis?
Presentation Software
What software do I use to create presentations?
Presentation software
How do I create a presentation?
Database Software
How can I use database software?
Oracle, mysql, Microsoft access
How do you benefit when businesses use database software?
Purchase history
Note Taking Software
Is there software to help students with note taking?
One note
Are there free or portable note taking applications?
Evernote
Personal Information Manager (PIM) Software
What applications should I use to manage my time, contact lists, and tasks?
Microsoft outlook
Are there web-based PIM programs?
Yup on google, yahoo
Productivity Software Features
What tools can I help me work more efficiently with productivity software?
A wizard: a guide that walks you through the steps necessary to complete a
complicated task
A template: a predesigned form
Macro: small program that groups a series of commands, so that they will run as a
single command
Integrated Software Applications
Whats an integreated software application?
It is a single software program that incorporates the most commonly used tools of many
productivity software programs into a single integrated program
Ex. Microsoft works
Why would I use an integrated software application instead of individual stand-
alone programs?
Less expensive, just basic necessities
Software Suites
Whats a software suite?
Group of software programs
Which applications do productivity software suites contain?
Word, spreadsheet, powerpoint, PIM
What are the advantages of software suites?
Cheaper, same company for each product
Personal Financial Software
What software can I use to prepare my taxes?
Tax preparation software, ex. Turbotax, intuit
Which software can I use to help keep track of my personal finances?
Financial planning software, Microsoft money
Media Software for Home
Multimedia software includes image, video, and audio editing software
Digital Image Editing Software
What can I do with a digital image that I can’t do with a photograph?
post on the web with picasa
What software can I use to edit my photos?
Image editing software, adobe Photoshop and Corel paint shop
Can nonprofessional use image editing software?
yes, the programs are geared towards home owners, and casualists
Digital Audio Software
Why would I have digital audio files on my computer?
Podcasts, bought
Why are MP3 files so popular?
Standard for audio file compression
Stands for MPEG-1 Audio Layer 3
MP3 Recordings
CD ripping
CD burning
Encoding and decoding (done by encoders)
Format conversion
Can I edit audio files?
Audio editing software, such as audacity
Digital Video Editing Software
What kind of software do I need to edit my digital videos?
Digital editing software
Premiere pro, final cut pro
Does video editing software support all kinds of video files?
AVCHD (advanced video coding high definition)
In what format are the videos I watch on my portable media player?
MP4- MPEG-4
Media Management Software
How do I manage the audio, video, and image files on my system?
Itunes, winamp
Are there Web-based programs available to edit, share, and store my photos?
Snapfish.com, shuttfly.com, flicker.com
Software Fun for Home
Entertainment software, for getting fun!
Virtual reality programs: turn artificial environments into a realistic experience
Gaming Software
Do I need special equipment to run entertainment software?
Special requirements, and controllers
How do I tell what computer games are appropriate for a certain user?
Entertainment Software Rating Board (ESRB), has two parts: rating symbol, age
appropriateness, and content descriptors, E, T,,M,AO
Can I make video games?
Adobe flash, and RPG maker
Educational Software
What kinds of educational applications are there?
What types of programs are available to train you to use software or special
machines?
Simulation programs, control as if it was real
They can help prevent real life errors
Do I need special software to take courses online?
Course management software
Drawing Software
What kind of software should I use for simple illustrations?
Illustration software
Are there different types of drawing software?
Adobe illustrator is professional
Microsoft Visio for engineers
Business Software for Home and Office
Home Business Software
Which programs are good for small business owners?
Accounting software, ex. Peachtree QuickBooks
What software can I use to lay out and design newsletter and other publications?
Desktop publishing software (DPS), QuarkXPress, adobe InDesign
What tools do desktop publishing programs include?
Everything for making a good publication
What software do I use to create a Web page?
Web page authoring software, which doesn’t need HTML knowledge
Dreamweaves, Microsoft Expression
Are there other ways to create Web pages?
Just convert something into a webpage if it was only one file, convert to a Web
compatible format
Large Business Software
What software do businesses use for planning and management?
Palo Alto Software’ Business Plan Pro and Marketing Plan Pro helps users write
strategic and development plans for general business and marketing needs
Project management software, Microsoft project
Customer relationships management (CRM) software, includes programs that get in
touch and follow up with clients
GoldMine, and FrontRange Solutions
Enterprise resource planning (ERP) system: lets business consolidate multiple systems
into one and improve coordination of these business areas across multiple departments.
They help control many “back office” operations. Oracle and SAP
What software helps business travelers?
Mapping programs such as DeLorme Street Atlas USA and Microsoft Street and Tips
Online mapping service is what people go to now, work with GPS system
Is mapping software just used to assist with travel?
Many companies use a GIS (geographical information system) to assist with mapping,
managing, analyzing, and displaying data, in a spatial form
What software is used with e-commerce?
IBM’s Websphere, GoEmerchant, and ProStores business offer bundled Web Site
creation and hosting services, shopping cart setup, and credit card processing services
Specialized Business Software
Vertical market software: software designed for a specific industry
Ex. Construction uses MasterBuilder
What software is used to make 3D models?
Computer-aided design (CAD), used by engineers and architects
Autodesk is for graphic animation
Getting Help with Software
Where can I find help while I’m working with an application?
Online help and support, user’s manual,
Integrated help means that the documentation for the product is built directyly into the
software
Where do I go for tutorials and training on an application?
Malektips.com
Buying software
Software Liscenses
Don’t I own the software I buy?
You can’t lend it out…
What is a software license?
Software license is an agreement between the user and the software company
Do you always buy just one license?
You can “extend” the licence to other computers
Multiuser licenses limit the user amount
Concurrent licenses limit the number of people accessing the software at any given time
Does open source software require a license?
Copyleft: modified open source software under that terms as the original software, it
must be distributed as free software
Pre-Installed Software
What application software comes with my computer?
Basic stuff
Are there any problems associated with pre-installed software?
Trials expire, and they use up memory, and processing power, reduce battery power
Bloatware: pre-installed software
Can I get the manufacturer to uninstall or install software before shipping?
Dell had an easy removal tool
If my computer crashes, can I get the pre-installed software back?
Make a restore disk after you buy a computer
Web-based Applications
Does all application software require installation on my computer?
Software as a Service (SaaS), also known as Web-based applications, the user uses
the program online
What kinds of Web-based applications are available?
Microsoft web based apps
Good docs
What advantages do Web-based applications have?
Collarboration, portability
Is all Web-based software free?
No, of course not!
Discounted Software
Is it possible to buy software at a discount?
Yes, for short periods of time, and so that the developer can get increased awareness
of the product
Can I buy used software?
Online auctions, make sure its legal
Can I buy software directly from the Internet?
Yes ffs!
Freeware and Shareware
Can I get software for free legally?
Freeware: any copyrighted software that you can use for free
Opensource: programs are free to use on the condition that any changes you make to
improve the source code must be distributed for free
Can I try new software before it is released?
Beta versions: versions under development
Trials
Is it still freeware if I’m asked to pay for the program after using it a while?
Known as shareware: distributed for free then must be bought
Can shareware programmers make me pay for their shareware once I have it?
No it stops working
Are there risks associated with installing beta versions, freeware, and shareware
or downloading them from the Internet?
Yes beta versions are buggy and can screw your computer
Software Versions and System Requirements
What do the numbers after software names indicate?
Version of the program
When is it worth buying a newer version?
Depends how often you use it, and whether the upgrade is cost effective
If I have an older version of software and someone sends me files from a newer
version, can I still open them?
Called backward compatible, but most programs are not forward compatible
How do I know whether the software I buy will work on my computer?
System requirements: specify the minimum recommended standards for the operating
system and other requirements
Installing Uninstalling, and Starting Software
How do I install software
Wizard
How is the installation process different from software I download from the web?
No disk…
What do I do if the downloaded program doesn’t install by itself?
Look for a .exe icon
What’s the difference between a custom installation and full installation?
Full installation is to the designated disk location
Custom installation: wherever you want to put it
Can I just delete a program to uninstall it?
Look for uninstall button…
Is there a best way to start an application?
Shortcut
Taskbar
Or Start menu bar
Five: Using System Software
Basic System Software
CPU: central processing unit
Utility program: performs many of the general housekeeping tasks for the computer
Do all computers have operating systems?
Are all operating systems alike?
Microsoft Disk Operating System (MS-DOS)
Multitask
Multiuser
Types of Operating Systems
Real-Time Operating Systems
Why do machines with built-in computers need an operating system?
Real time operating system (RTOS): machines that are required to do a series of
specific tasks in an exact amount of time
Operating systems are also referred to as embedded systems
RTOS are sued for the military, science, and aerospace industries
Where else are RTOSs in use today?
Fuel injection cards, printers, medical devices
What kind of operating system controls a simple cell phone?
They have their own to make simple tasks one at a time
Operating Systems for Networks, Servers, and Mainframes
What kind of operating system do networks use?
Multiuser operating system (aka networking operating system)
Server: the computer on a network that manages network resources
What is UNIX?
Unix is a multiuser multitask operating system used as a network operating system,
primarily with mainframes, developed by Ken Thompson and Dennis Ritchie of AT&T in
1969
What other kinds of computers require a multiuser operating system?
Mainframe computers: used by large corporations, it is responsible for storing,
managing and simultaneously processing data from all users
Mainframe is under multiuser category
Supercomputers also use multiuser operating systems
Operating Systems for Mobile Devices
What kind of operating system do smartphones use?
Symbian is most popular, Android
Do Gaming consoles and personal media players require an operating system?
The systems programs aka firmware which includes the programs
Operating Systems for Personal Computers
What is the Microsoft Windows operating system?
MSDOS-Windows 95, XP, Windows 7
What is the difference between the various editions of Windows 7 operating
systems?
Home, Professional, Ultimate
32-bit for versions with up to 4GB
64-bit more than 4 GB
What is the Mac Operating System?
MacOS
Does it matter what operating system is on my computer?
Computer’s platform: the combination of operating system and processor
Can I have more than one operating system on my computer?
Just separate the harddrive into different sections, known as partitions
What is Linux?
Linux is open source operating system, its based on the central programming code with
the rest from GNU
Made by Linus Torvals in 1991
Where else is Linux used?
Android, MeeGo
Where can I get Linux?
Distributors such as Ubuntu, Fedora, Suse, Debian GNU/Linux
What the operating system does
Coordinates flow of data: provides a way for the user to interact with the computer,
manages processor/CPU, manages memory/storate, systems hardware, and peripheral
devices
The User Interface
How does the operating system control how I interact with my computer?
User interface
DOS had a command driven interface
Later a menu driven interface was used
What kind of interface do operating systems use today?
Graphical user interface (GUI)
Processor Management
Why does the operating system need to manage the processor?
The OS arranges the execution of all the activities in a system
How exactly does the operating system coordinate all the activites?
Controls the timing of events the processor works on
When an action is asked, the OS creates a unique signal called an interrupt (each
device has its own interrupt)
Interrupt handler, a special numerical code that prioritizes the requests
The interrupt table is in the RAM, which the OS does peemptive multitasking by
performing tasks with higher assigned priority first
Ex. When a printer needs to print something the OS puts a “memo” in the RAM called a
stack. The memo is what the computer was doing before it started to work on the printer
request
What happens if there is more than one document waiting to be printed?
OS puts the requests in another area called the buffer until the spooler a program that
helps coordinate all print jobs currently being sent to the printer
Memory and Storage Management
Why does the operating system have to manage the computer’s memory?
It needs to control the amount of space in the RAM so that it can make sure it doesn’t
get filled up, and so that it can delete older requests
Does the amount of RAM on a system control the type of OS I get?
Yes, the different 32bit 64bit versions
Can my system ever run out of RAM?
Different versions of OS which require more RAM such as the more robust versions of
windows
What happens if my computer runs out of RAM?
Uses virtual memory,
Some of the RAM data is temporarily stored in the area of the hard drive called the
swap file/page file, this swapping process is known as paging
Can I ever run out of virtual memory?
Excessive paging is called thrashing, increase more RAM to stop this
How does the operating system manage storage?
Hardware and Peripheral Device Management
How does the operating system manage the hardware and peripheral devices?
Each program has a device driver that facilitates communication between the hardware
device and the operating system
Do I always need to install drivers?
Devices that are included in Windows are called “Plug and Play” , where the computer
automatically recognizes the device
What happens if the device is not Plug_and_play (PnP?
Install with a disk, download
Can I damage my system by installing a device?
Programs may become unstable (stop responding), fixed with Windows with its Roll
Back Driver that removes a newly installed driver and replaces it with the last one that
worked
Software Application Coordination
How does the operating system help application software run on the computer?
With application programming interface (API), that application software needs in order
to interact with the OS, ex. Direct X for multimedia enhancement
What are the advantages of using APIs?
Programmers only need to refer to the API code blocks, and the program is very similar
to other ones which make it easy to incorporate
The Boot Process: Starting Your Computer
Boot process (start-up process) to load the operating system into the RAM, boot from
bootstrap (loads a small program used to start a larger program
What are the steps involved in the boot process?
How can I tell if my computer is entering the boot process?
Windows makes sounds, Mac has a nice logo
Step 1: Activating BIOS
What’s the first thing that happens after I turn on my computer?
The CPU activates the basic input/output system (BIOS), OS onto the RAM
Step 2: Performing Power-ON Self Test
How does the computer determine whether the hardware is working properly?
Makes sure everything is attached, the process is called power-on-self-test or POST,
then compares its findings with the information in CMOS (complementary metal-oxide
semiconductor), it uses almost no power, if everything matches the boot process
continues, if not CMOS will detect it and the computer is alerted
Step 3: Loading the operating system
How does the operating system get loaded into RAM?
The BIOS goes through a list of devices in its search for the drive that contains the
system files (main files of the OS), when located it is sent into RAM, once the process is
finished the kernel (supervior program) is loaded, it manages everything else, the kernel
is the memory resident (it stays in the RAM the whole time), less critical parts don’t stay
on the RAM and so called non-resident.
Step 4: Checking further configurations and customizations
When are the other components and configurations of the system checked?
CMOS checks the stuff, the registry (contains all the different configurations used by the
OS and by other applications
Why do I sometimes need to enter a login name and password at the end of the
boot process?
To prove authentication for the user to enter the system
How do I know if the boot process is successful?
The restored desktop
Handling Errors in the Boot Process
What should I do if my computer doesn’t boot properly?
Reinstall the program
What is Safe mode?
Safe mode is a special diagnostic mode designed for troubleshooting errors
Only essential devices function
In safe mode you can use the Device Manager which has the Last Known Good
Configuration
Try system restore
What should I do if my keyboard or another device doesn’t work after I boot my
computer?
Boot, patch
The desktop and windows features
What are the main features of the Windows desktop and Start menu?
Skip skip skip
Organizing Your Computer: File Management
File management: which entails providing organizational structure to the computer’s
contents
Directory: structure that includes files, folders, libraries, and drives
Organizing Your Files
File Compression Utilities
What is file compression?
File compression utility is a program that takes out redundancies in a file to reduce the
file size
Winzip and StuffIt for Mac
How does file compression work?
They look for repeated patterns of letters and replace these patterns with a shorter
placeholder, placeholder are catalogued and stored temporarily in a file called the
dictionary
How effective are file compression programs?
Varies on the type and size of the file, and the compression method used
Audio files get rid of sounds that he human ear can’t hear
Picture files get rid of the pixels that you couldn’t see anyways
How do I decompress a file I’ve compressed?
Use the same program that you used to compress
System Mainenance Utilities
Are there any utilities that make my system work faster?
Disk cleanup: a windows utility that cleans, or removes unnecessary files for the hard
drive
How can I control which files Disk Cleanup deletes?
Check off the different cleaning areas
What else can I do if my system runs slowly?
Disk defragmenter: regroups related prices of files on the hard drive, therebuy allowing
the OS to work more efficiently
Macs don’t need as they run more efficiently already, but the program IDefrag can be
used
How do I diagnose potential errors or damage on my storage devices?
Error-checking: aka scandisk is a windows utility that checks for lost files and fragments
as well as physical errors on your hard drive
Lost files and fragments of files are referenced on the file allocation table or FAT to files
that no longer exist of have been moved
Physical errors on the drive occur when the mechanism that reads the hard drive’s data
can no longer determine whether the area holds a 1 or 0, these are called bad sectors
Where can I find Error-checking?
Properties of a file
How can I check on a program that has stopped running?
Use the task manager utility, exist it if non-responsive
Problem Reports and Dr. Watson are programs that save logs when errors occur so that
the report can be sent to professional support
System Restore and Backup Utilities
Is there an undo command for the system?
System Restore: allows for a role back to a specific data with system settings
How does the computer remember its previous settings?
Every time the computer starts or a new application installation Windows automatically
creates a system restore point
How can I protect my data in the event something malfunctions in my system?
Backup and Restore utility, which copies things to a disk or storage device
Mac has Time Machine, and Time Capsules
System repair disc, give you options for repairing the system on system boot up
The Task Scheduler Utility
How can I remember to perform all these maintenance procedures?
Task Scheduler Utility, allows for the schedule tasks to run automatically at
predetermined time, with no additional action necessary on your part.
Accessibility Utilities
Are there utilities designed for users with special needs?
Ease of access centre, on screen computer etc…
High contrast: adjust color scheme setting and contrast between text and background
Magnifier: displays magnified portion of the screen
Narrator: basic speech program
On-screen keyboard: keyboard on the screen
Windows speech recognition: dictate text and control computer by voice
f i ve
fi v e
summary
summary
chapter
user interface (GUI). Unlike the commandand
menu-driven interfaces used earlier,
GUIs display graphics and use the pointand-
click technology of the mouse and cursor,
making the OS more user friendly.
Common features of GUIs include windows,
menus, and icons.
5. How does the operating system help
manage resources such as the
processor, memory, storage,
hardware, and peripheral devices?
When the OS allows you to perform more
than one task at a time, it is multitasking. To
provide for seamless multitasking, the OS
controls the timing of events the processor
works on.
As the OS coordinates the activities of the
processor, it uses RAM as a temporary
storage area for instructions and data the
processor needs. The OS is therefore responsible
for coordinating the space allocations
in RAM to ensure that there is enough space
for the waiting instructions and data. If
there isn’t sufficient space in RAM for all the
data and instructions, then the OS allocates
the least necessary files to temporary storage
on the hard drive, called virtual memory.
The OS manages storage by providing a
file-management system that keeps track
of the names and locations of files and
programs. Programs called device drivers
facilitate communication between devices
attached to the computer and the OS. Device
drivers translate the specialized commands
of devices to commands that the OS can understand
and vice versa, enabling the OS to
communicate with every device in the computer
system. Device drivers for common
devices are included in the OS software,
whereas other devices come with a device
driver that you must install or download
off the Web.
6. How does the operating system
interact with application software?
All software applications need to interact
with the CPU. For programs to work with
the CPU, they must contain code that the
CPU recognizes. Rather than having the
same blocks of code appear in each application,
the OS includes the blocks of code to
1. What software is included in system
software?
System software is the set of software programs
that helps run the computer and
coordinates instructions between application
software and hardware devices. It
consists of the operating system (OS) and
utility programs. The OS controls how
your computer system functions. Utility
programs are programs that perform general
housekeeping tasks for the computer,
such as system maintenance and file
compression.
2. What are the different kinds of
operating systems?
Operating systems can be classified into four
categories. Real-time operating systems
(RTOSs) require no user intervention. They
are designed for systems with a specific purpose
and response time (such as robotic
machinery). Smartphones have their own
specific operating systems, the latest of
which allow the user to multitask. Current
operating systems for desktops, notebooks,
and netbooks have multitasking capabilities,
as well as networking capabilities.
3. What are the most common operating
systems?
Microsoft Windows is the most popular OS.
It has evolved into a powerful multiuser
operating system. The most recent release
is Windows 7. Another popular OS is the
Mac OS, which is designed to work on
Apple computers. Apple’s most recent
release, Mac OS X Snow Leopard, is based
on the UNIX operating system. There are
various versions of UNIX on the market,
although UNIX is most often used on networks.
Linux is an open source OS based
on UNIX and designed primarily for use on
personal computers, although it is often
found as the operating system on servers.
4. How does the operating system
provide a means for users to interact
with the computer?
The operating system provides a user interface
that enables users to interact with the
computer. Most OSs today use a graphical
242 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
which software applications refer. These
blocks of code are called application programming
interfaces (APIs).
7. How does the operating system help
the computer start up?
When you start your computer, it runs
through a special process called the boot
process. The boot process consists of four
basic steps: (1) The basic input/output system
(BIOS) is activated when the user powers
on the CPU. (2) In the POST check, the
BIOS verifies that all attached devices are in
place. (3) The operating system is loaded
into RAM. (4) Configuration and customization
settings are checked.
8. What are the main desktop and
windows features?
The desktop provides your first interaction
with the OS and is the first image you see on
your monitor once the system has booted
up. It provides you with access to your computer’s
files, folders, and commonly used
tools and applications. Windows are the rectangular
panes on your screen that display
applications running on your system. Common
features of windows include toolbars,
scrollbars, and minimize, maximize and
restore, and close buttons.
summary
9. How does the operating system help
me keep my computer organized?
The OS allows you to organize the contents
of your computer in a hierarchical structure
of directories that includes files, folders,
libraries, and drives. Windows Explorer
helps you manage your files and folders by
showing the location and contents of every
drive, folder, and file on your computer.
Creating folders is the key to organizing
files because folders keep related documents
together. Following naming conventions
and using proper file extensions are also
important aspects of file management.
10. What utility programs are included
in system software, and what do
they do?
Some utility programs are incorporated
into the OS; others are sold as stand-alone
off-the-shelf programs. Common Windows
utilities include those that enable you to
adjust your display, add or remove programs,
compress files, defragment your
hard drive, clean unnecessary files off
your system, check for lost files and errors,
restore your system to an earlier setting,
back up your files, schedule automatic
tasks, and check on programs that have
stopped running.
243
Multiple Choice
1. Which is not an example of a smartphone
operating system?
a. Symbian c. Snow Leopard
b. Android d. webOS
2. Which OS does not have a user
interface that incorporates point-andclick
technology?
a. Windows 7 c. Linux
b. MS-DOS d. Mac OSX
3. Which is the correct order of the boot
process?
a. Check settings, load BOS into
RAM, activate BIOS, conduct POST
b. Load OS into RAM, check
settings, conduct POST, activate
BIOS
c. Activate BIOS, conduct POST,
load OS into RAM, check settings
d. Conduct POST, load OS into RAM,
activate BIOS, check settings
4. You can determine the location of a
file by its
a. name. c. extension.
b. path. d. type.
5. Which is not a function of the
operating system?
a. Providing a means for the user to
interact with the computer
b. Enabling the processor to handle
multiple operations, seemingly at
the same time
c. Carefully shutting the system
down when RAM limits have
been reached
d. Facilitating installation of
peripheral devices with the
inclusion of drivers
6. The term that defines excessive
swapping of files between RAM and
virtual memory is:
a. thrashing.
b. multitasking.
c. caching.
d. paging.
7. Which term describes the pictures
that represent an object such as a
software application or a folder?
a. Icon c. Taskbar
b. Gadget d. Widget
8. Which statement about using APIs is
not true?
a. APIs prevent redundancies in
software code.
b. APIs make it easier for developers
to respond to OS changes.
c. APIs allow application software
to interact with the OS.
d. APIs make it possible to close
non-responding software and
restart the computer.
9. Which utility eliminates the
inefficiencies of the computer hard
drive?
a. System Restore
b. Disk Defragmenter
c. File Compression
d. Disk Cleanup
10. Which utility is not a system tools
utility?
a. System Restore
b. Disk Defragmenter
c. Windows Explorer
d. File Compression
True–False
___F_ 1. Only personal computers need some form of operating system software.
__F__ 2. Symbian OS is a common OS for netbooks.
_T___ 3. The type of processor helps to determine which OS a computer uses.
__T__ 4. Paging is the process of optimizing RAM storage by borrowing hard drive space.
___T_ 5. Windows 7 includes a compatibility feature that allows you to run software that is
not compatible with Windows 7.
Chapter 6: Understanding and Assessing Hardware
Is it the computer or me?
CPU’s improvement chart is Moore’s Law by Gordon Moore
Dynamic random access memory (DRAM) has been increasing by about 60 percent every year
What is your ideal computer?
But what if I don’t have a computer?
“ To determine
your ideal
system, consider
what you want to
be able to do
with your
computer. ”
How does a notebook compare to a desktop for value?
Desktops are cheaper and more reliable
Laptops are more expensive and not as reliable
How long will a note-book be useful to me?
Depends how easy it is to upgrade it
For notebooks external SATA (eSATA)
ExpressCard reader
Assessing Your Hardware: Evaluating Your System
Conduct a system evaluation look at the computer’s subsystems to see what they do and how
they perform
CPU subsystem
Memory subsystems (RAM)
Storage subsystems (hardrive)
Video subsystems
Audio subsystems
Ports
Evaluating the CPU Subsystem
Intels: i7, and three core power processor
And AMD processors: Athlon and Phenom
How does the CPU work?
Comprised of two units: control unit and the arithmetic logic unit (ALU)
Control unit coordinates the activities of all the other computer components
The ALO is responsible for performing all the arithmetic calculations, also makes comparison
decisions
CPU steps: Machine cycle
1. Fetches a piece of data or instruction from RAM
2. Decodes the instruction into usable computer language
3. Executes the instruction, and stores result in RAM
What makes one CPU different from another?
Processing power, how quickly it works (clock speed), and the amount of immediate access
memory of the CPU called cache memory
How will a multiple-core CPU help me?
Through hyper threading multiple machine cycles at the same time, multiple cores have different
machine cycle sections
How do I pick that fastest processor?
Cache memory, easier to process as the RAM is fast for the CPU
Level 1 cache is a block of memory that is built onto the cPU chip for storage of data or
commandes that have just been used
Level 2 cache: on the CPU chip, contains more storage area that area 1
Level 3 cache slower for the CPU to reach but larger in size
Front side bus (FSB) speed, connects the processor to the system memory, it’s a highway for
information and measured in MHz
Benchmarks: are measurements used to compare CPU performance
Why are there different CPU choices for notebooks and desktops?
Notebooks need to be more energy efficient
What CPU does my current computer have?
Check system properties
How can I tell whether my CPU is meeting my needs?
CPU usage: percentage of time that your CPU is working
Will improving the performance of the CPU be enough to improve my computer’s
performance?
It could a lot, but there might be a bottleneck in the processing because of insufficient RAM or
harddrive
Evaluating RAM: The Memory Subsystem
RAM: computers temporary storage space, volatile storage
ROM non-volatile
Why not use a hard drive to store the data and instructions?
RAM is a million times faster that’s why it’s measured in nanoseconds, hard drive takes 10
millisecounds
Are there different types of RAM?
RAM comes in the form of double data rate 2 (DDR2) memory modules
DDR3 are faster/higher end RAM
DRAM, SRAM, SDRAM (synchronous DRAM), are all found on older computers
RAM appears in the system on memory modules
Memory modules today are called: dual inline memory modules (DIMMs)
How can I tell how much RAM is installed in my computer and how it’s being used?
Memory modules are called physical memory
Look at system properties
Measured in GB
Windows 7 uses a memory management technique known as SuperFetch, which monitors
which applications you use the most and preloads them into your system memory so that they’ll
be ready to go
Windows 7 uses a memory management technique known as SuperFetch, which monitors
which applications you use the most and preloads them into your system so that they’ll be read
y to go
How much memory does the operating system need to run?
The OS uses kernel memory, approx. 555MB of the total RAM available
How much RAM do I need?
Depends what you’re tasks are, and if it requires a lot of programs functioning at the same time
Adding RAM
Is there a limit to how much RAM I can add to my computer?
Depends on number of slots on the motherboard
Is it difficult or expensive to add RAM?
Simple, and can be expensive at times
Evaluate the Store Subsystem
The Hard Drive
What makes the hard drive the most popular storage device?
It’s cheaper/GB, it has the most storage capacity, and access time is much quicker than
external ones.
Hard drive access time is measured in ms
Solid state drive (SSD) .1ms
Speed of data transfer is called data transfer rate
How is data stored on a hard drive?
A hard drive has several coated round, thin plates of metal stacked on a spindle, each plate is
called a platter. When data is saved to a hard drive platter, a pattern of magnetized spots is
created on the iron oxide coating of each platter.
How do I know how much storage capacity I need?
GB, TB
How do hard drives compare to speed?
Different types of hard drives
Integrated Drive Electronics (IDE) which is also called parallel advanced technology
attachement (PATA), uses wide wires for connection
Serial Advanced Technology Attachment (Serial ATA), uses much thinner cables, and can
transfer more quickly
SSD (solid state drive)
Do I want one huge drive or several smaller drives?
Depends what’s important to me: speed or security
You can purchase smaller drives and combine them using RAID technology, using more than
one drive in a system
RAID 1, and 0 are the most popular for consumer machines
RAID 0 where the write begins on the first drive and the second drive jumps ahead to do the
next block of data, RAID 0 fails if either one of the drives stops working, so RAID 0 is for those
concerned with performance as it writes twice as fast. 1TB offers 1TB of data
RAID 1 where the data written on one drive is perfectly mirrored onto the second drive, this is a
more safer configuration
1TB offer 500GB of data, the second is for the “mirror”
Optical Storage
Use lasers, to etch pits into disks
Pits and Nano pits are called lands
Optical media: Blu-ray and DVD
Why can I store data on some discs but not others?
Pre-recorded: CD-ROM, DVD ROM, BD ROM
Recorded: DVD ROMS BD ROMS (movies)
Rewritable: CD-RW, DVD-RW, BD-RE
Do I need separate players and burners for CD, DVD, and now BD formats?
It’s a hierarchy of playing with players
Are there different standards of optical media?
DVD-R/RW, DVD+R/RW, DVD-RAM
Are some CD and DVD drives faster than others?
Format is record speed, rewrite speed, play back speed, and each number represents the
transfer of 150kb of data so 52X32X52X is 52 X 150Kb which is 7,800 KB/seconds
DVD-ROM provide a transfer rate of 1.3MB/s
So how do my storage devices measure up?
Evaluating the Video Subsystem
Video Cards
What is a video card?
Video card is an expansion card that is installed inside your system unit to translate
binary data into images you view on your monitor
Video cards include their own RAM called video memory
Standards of video memory are GDDR3 and the newer graphics double rate 5 (GDDR5)
memory
Video cards have their own graphics processing units (GPUs)
Is a GPU different from a CPU?
Graphics processing unit (GPU) performs the same kind of computational work that a
CPU performs, a GPU is specialized to handle 3-D graphics and image and video
processing with incredible efficiency and speed
Does the GPU live on the motherboard or on the video card?
Sometimes integrated into the motherboard, but high-end video cards have their own
GPU’s separate
How can I tell how much memory my video card has?
Advanced settings of the screen resolution dialog box
How much memory does my video card need?
128 for webbroswe
540+ for gaming
How many video cards can I add to a system?
Only if you are a gamer
Nvidia, and ATI created the standard for combining multiple video cards called SLI and
Crossfire
What else does the video card do?
Controls the number of colors the monitor can display
Number of bits the video card uses to represent each pixel is called bit depth
4-bit displays 16 colors, the minimum
Today 24-bit display 16million colors, this mode is called true color mode
When is it time to get a new video card?
Delay in refreshing, if you need to display on more monitors
Evaluating the Audio Subsystem
Sound Cards
What does the sound card do?
Expansion card that attaches to the motherboard inside your system unit, it enables the
computer to produce sounds
Can I hook up a surround system to my computer?
No, only 3D sound which is the sounds that humans can’t hear but makes a more realistic
sound where you can’t tell whether it’s from the left or right
What is surround sound then?
A type of audio processing that makes the listener experience sound as if it were coming from
all directions
Sound standard is from Dolby
To make surround sound Dolby takes digital sound from a medium (DVD) and reproduces it in
eight channels. Seven channels cover the listening field with placement to the left front,
rightfrom ,right and left rear and two extra side speakers, the eighth is a subwoofer (plays really
low sounds)
I don’t need surround sound on my computer. Why else might I need to buy an upgraded
sound card?
They have more connection ports for music making stuff, jukeboxes, portable mini players
Evaluating System Reliability
What can I do to ensure my system performs reliably?
Clean out start up folder
Clean out unnecessary files
Run spyware and adware removal programs
Run the disk defragment utility on your hard drive
My system crashes often during the day. What can I do?
1. Check you have enough RAM
2. Properly install new software or hardware
3. Check the windows support website if you receive an error code
Can my software affect system reliability?
Run psr the problem steps recorder
How do I know whether updates are available for my software?
Check for updates
What if none of this helps? Is buying a new system my only option?
1. Upgrade your operating system to the latest version
2. Reinstall the operating system
Making the final decision
Gigabiter is where you can give them your computer to recycle it properly
s s ix ix
summary
summary
chapter
4. What are the computer’s main
storage devices, and how can I
evaluate whether they match my
needs?
Storage devices for a typical computer system
may include a hard drive, an SSD drive,
a flash drive, and CD and DVD drives. Bluray
drives are gaining in popularity for
viewing and burning high-density media.
When you turn off your computer, the data
stored in these devices remains. These
devices are referred to as nonvolatile storage
devices. Hard drives have the largest storage
capacity of any storage device and are
the most economical. Newer SSD drives
have the fastest access time and data
transfer rate of all nonvolatile storage
options. CDs and DVDs have capacities
from 700 MB to 17 GB, while Blu-ray discs
can hold up to 50 GB. Portable flash drives
allow easy transfer of 64 GB or more of
data from machine to machine. To determine
the storage capacity your system
needs, calculate the amount of storage your
software needs to reside on your computer.
To add more storage or to provide more
functionality for your system, you can
install additional drives, either internally
or externally.
5. What components affect the output of
video on my computer, and how can
I evaluate whether they match my
needs?
How video is displayed depends on two
components: your video card and your
monitor. A video card translates binary data
into the images you see. These cards include
their own RAM (video memory) as well as
ports that allow you to connect to video
equipment. The amount of video memory
you need depends on what you want to display
on the monitor. A more powerful card
will allow you to play graphics-intense
games and multimedia.
1. How can I determine whether I
should upgrade my existing computer
or buy a new one?
To determine whether you need to upgrade
your system or purchase a new one, you
need to define your ideal system and what
you want it to do. Then you need to perform
a system evaluation to assess the subsystems
in your computer, including the CPU,
memory, storage, video, and audio. Finally,
you need to determine if it’s economical to
upgrade, or whether buying a new
computer would be better.
2. What does the CPU do, and how can I
evaluate its performance?
Your computer’s CPU processes instructions,
performs calculations, manages the
flow of information through the computer
system, and is responsible for processing the
data you input into information. CPU speed
is measured in gigahertz (billions of
machine cycles per second). You can tell
whether your CPU is limiting your system
performance by watching how busy it is as
you work on your computer. The percentage
of time that your CPU is working is referred
to as CPU usage, which you can determine
by checking the Task Manager. Benchmarking
software offers direct performance
comparisons of different CPUs.
3. How does memory work in my
computer, and how can I evaluate
how much memory I need?
RAM is your computer’s temporary
memory. It remembers everything that the
computer needs to process data into information.
However, it is an example of volatile
storage. When the power is off, the data
stored in RAM is cleared out. The amount of
RAM sitting on memory modules in your
computer is your computer’s physical memory.
The memory your OS uses is kernel
memory. At a minimum, you need enough
RAM to run the OS plus the software applications
you’re using, plus a bit more to hold
the data you will input.
6. What components affect the quality
of sound on my computer, and how
can I evaluate whether they match
my needs?
Your computer’s sound depends on your
speakers and sound card. A sound card
enables the computer to produce sounds.
Users upgrade their sound cards to provide
for 3D sound, surround sound, and additional
ports for audio equipment.
7. How can I improve the reliability of
my system?
Many computer users decide to buy a new
system because they are experiencing problems
with their computer. However, before
summary
you buy a new system because you think
yours may be unreliable, make sure the
problem is not one you can fix. Run a full
scan with antispyware software. Make sure
you have installed any new software or
hardware properly, check that you have
enough RAM, run system utilities such as
Disk Defragmenter and Disk Cleanup, clean
out your Startup folder, remove unnecessary
files from your system, and keep your software
updated with patches. If you continue
to have troubles with your system, reinstall
or upgrade your OS, and, of course, seek
technical assistance.
297
Multiple Choice
6. What allows two different programs
to be processed at one time?
a. Hyperthreading
b. SSD
c. Benchmarking
d. GPU
7. Which is not a type of memory stored
in your system?
a. RAM
b. Cache
c. CPU register
d. ALU
8. The optimal amount of memory for a
video card depends on
a. the quality of video you will be
watching.
b. the resolution of the monitor.
c. the number of monitors you have.
d. All of the above.
9. SuperFetch is a memory-management
technique that
a. determines the type of RAM your
system requires.
b. makes the boot-up time for the
system very quick.
c. preloads the applications you use
most into system memory.
d. defragments the hard drive to
increase performance.
10. What is the name for the time it takes
a storage device to locate its stored
data and make it available for
processing?
a. Clock speed
b. Access time
c. Data transfer rate
d. Seek time
True–False
__F__ 1. A single CPU can have multiple cores but cannot also use hyperthreading.
__T__ 2. The memory that your operating system uses is referred to as kernel memory.
__T__ 3. Motherboards are designed with a specific number of memory card slots.
__T__ 4. Cache memory is a form of read-only memory that can be accessed more quickly
by the CPU.
__T__ 5. Solid state drives are faster than hard drives and eSATA drives.
Chapter 7: Networking
Networking Fundamentals
What is a computer network?
Network: simply two or more computers that are connected via software and hardware so that
they can communicate with each other
What are the benefits to having computers networked?
Share internet connection, communicate with devices such as printers
Besides peripheral and Internet connections, does networking facilitate any other types
of resource sharing?
Public sharing folders
Are there disadvantages to setting up a network?
Cost for equipment, administered
Network administration: involves: 1. Installing new computers and deivces, 2. Monitoring the
network to ensure it is performing efficiently, 3. Updating and installing new software on the
network, 4. Configuring or setting up, proper security for a network
Network Architectures
Network architectures: refers to the design of a network (classified by how they are controlled
and the distance between their nodes)
Describing Networks Based on Network Administration
What different types of control do I have on my network?
Local administration: configuration and maintenance of the network must be performed on each
individual computer attached to the network (ex. Peer-to-peer network)
Central administration: tasks can be performed from one computer and affect the other
computers on the network (ex. Client/server network)
What is a peer-to-peer network?
Peer-to-peer (P2P) network: each node connected to the network can communicate directly with
every other node on the network, all nodes are equal (peers)
What are client/server networks?
Client/server networks: contains two different types of computers: clients and servers
Client: computers where users complete specific tasks
Server: computer that provides information or resources to the client computers on the network
Are client/server networks ever used as home networks?
Yes, but they cost more
Home network server: designed to store media, share media across the network, and back up
files on computers connected to the network
Ex. Acer Aspire easyStore server
Desribing Networks Based on Distance
How does the distance between nodes define a network?
Local area network (LAN): network in which nodes are located within a small geographic area
Home area network (HAN): network located in a home
Is it possible to connect LANs?
Wide area network (WAN): made up of LANs connected over long distances
Ex. University campuses
Are wireless networks that cover large areas like cities considered WANs?
Metropolitan area network (MAN)
Network Components
Transmission Media
How are nodes on a network connected?
By transmission media: transmission media: established a communications channel between
the nodes on a network and can either be wireless or wired
Wireless networks use radio waves connected to nodes
Wired networks use a various types of cable (wires) to connect nodes.
Twisted-pair cable: made up of copper wires that are twisted around each other and surrounded
by a plastic jacket (telephone)
Coxial cable: consists of a single copper wire surrounded by a layer of plastic (tv.)
Fiber optic cable
Does it matter what type of media you use to transfer data?
Different types of transmission media data transmit data at different speeds
Data transfer rate (bandwidth): maximum speed at which data can be transmitted between two
nodes on a network
Throughput: actual speed of data transfer that is achieved
Both measured in Mbps (megabits per second)
Network Adapters
How do the different nodes on the network communicate?
Network adapters: devices connected to or installed in a network nodes that enable the nodes
to communicate with each other and to access the network
Network interface card (NIC): designed to use different types of transmission media
Why would I ever consider using a wired connection with my notebook computer?
Wireless signals are more susceptible to interference from magnetic and electrical sources
Building materials
Distance from networking equipment
Network Navigation Devices
How is data sent through a network?
Network navigation devices: facilitate and control the flow of data through a network, data is
sent over in media bundles, and each bundle is a packet
What network navigation devices will I use on my home network?
Routers and switches
Router: transfers packets of data between two or more networks (home and internet networks)
Switch: “traffic cop” on a network, they receive data packets and send them to their intended
nodes on the same network (not between different networks)
Networking Software
What software do home networks require?
OS, Windows, Mac, Linux,
Is the same software used in client/server networks?
They have specialized network operating systems (NOS) software installed on them
The software handles requests for information, Internet access, and the use of peripherals for
the rest of the network nodes (communication goes through server first)
NOS software for Windows Server 2008 R2 and SUSE Linux Enterprise Server
Home Ethernet Networks
What type of peer-to-peer network should I install in my home?
Ethernet network: developed by the Electrical and Electronics Engineers (IEEE), it uses
Ethernet cables and makes the networks extremely efficient at moving data (they use both wired
and wireless transmission media)
What is the current wireless standard for Ethernet networks?
Current standard for Ethernet networks is the 802.11n standard, it is known as WiFi
Four standards are currently defined under the 802.11 WiFi standard: 802.11a, 802.11b,
802.11g, 802.11n (now the preferred choice for home networks with faster data transfer rates)
the standards work with backward compatibility
How do 802.11n wireless devices work?
Wireless routers and network adapters contain transceivers
Transceiver: device that translates the electronic data that needs to be sent along the network
into radio waves and then broadcasts these radio waves to other network nodes, they also
receive the signals from other network nodes
Multiple Input Multiple Output (MIMO): technology used in the 802.11n standard that achieves
higher throughput
Earlier wireless standards only utilized one antenna for transmitting and receiving data, devices
that use MIMO technology are designed to use multiple antennas for transmitting and receiving
data.
802.11n devices reach throughput up to 300Mbps under ideal conditions
Throughput Speeds
How can I tell how fast the wireless connection to my network is on my computer?
Net Gear software
What kind of throughput is achieveable with wired network connections?
Gb Ethernet standard
Network Cabling
What type of cable do I need to connect to a wired Ethernet network?
Most popular is unishielded twisted-pair (UTP) cable, its composed of four pairs of wires that are
twister around each other to reduce electrical interference
Have RJ-45 connectors
Do all wired Ethernet networks use the same kind of UTP cable?
Cat 5E
Cat 6
Cat 6a
What precautions should be taken when running UTP cable?
Do not put sharp bends into the cable, and run the cable along the perimeter of the room
How long can an Ethernet cable run be?
Can’t exceed 100 meters or the signal starts to degrade
Wired and Wireless on One Network
Can I have wired and wireless nodes on one Ethernet network?
Yes
Are there other types of P2P networks that can be installed in the home?
Non-Ethernet networks in the home are extremely rare: 1. Ethernet networks are based on a
well-established standard, 2. Feature easy set-up, 3. providing good throughput for home
networking needs, 4. are cost effective
Does the type of operating system I’m using affect my choice of a home networking
standard?
All OS have a built in Ethernet software
Home Ethernet Equipment
Routers and Switches: Moving Data around Your Network
What equipment do I need for a home Ethernet network?
Combination of routers and switches are called routers or broadband routers
What do switches do on an Ethernet network?
Acts as a traffic signal by enforcing the rules of the data road on the transmission media
Switch keeps track of the data packets and in conjunction with network interface cards, helps
the data packets find their destinations without running into each other
Also sends data packets directly to where they are headed, which makes the network running
efficiently
Connecting Devices to routers
How many computers and other devices can be connected to a router in a home
network?
Up to 253 wireless connections, but the bandwidth gets split into smaller portions
Does my wireless router support wired connections?
Most wireless routers have three or four Ethernet ports on the back of the router to support
wired connections via. Twisted pair cable
Where do I obtain a router for my home network?
Any electronics store, ISP
How do I know if my router supports wireless networking?
Ask ISP for newest networking standard 802.11n
Where do I place the router on my network?
Modem to router
Are wireless routers for Windows and OS X networks different?
Yes, but Apple has a special one for its own called AirPort
How do I set up my router so that I can use it to connect to the Internet?
Login to router through a web browser, and follow installation wizard
Connecting Network Nodes
What equipment do my computers need to communicate with wireless media on an
802.11n wireless network?
Network interface cards (NICs)
How can I tell what network adapters are installed in my computer?
Device manager utility
Connecting Other Devices to Networks
Network-Ready Devices
What is a network-ready device?
Network ready device: can be connected directly to a router instead of to a computer on the
network
Why should I connect my peripherals to my home network?
Easier to access
What can I attach to my network to facilitate file sharing and back up of data?
Network attached storage (NAS): specialized computing devices designed to store and manage
your data
Besides external hard drives, are their other NAS devices I could use on my network?
Home network server: automatically back up all computers connected to the network, acts a
repository for files to be shared across the network, function as an access gateway to allow any
computer on the network to be accessed from a remote location
Digital Entertainment Devices on a Network
Why should I connect my digital entertainment devices to my network?
Streamed media: media that is sent directly to a device without being saved to a hard drive
Media can also be downloaded where it is loaded onto a hard drve
What types of digital entertainment devices can I use to view streaming or downloaded
media?
Network ready televisions
DVRs (digital video recorders), record high-definition television programs (ex. TiVo)
Can I connect my gaming consoles to my home network?
Of course!
Specialized Home Networking Devices
What if I don’t need the full function ability of a PC, but I still want to access Internet
content?
iPad: an internet appliance
How can I use my home networking to enhance photo sharing?
Electronic photo frames are wireless now
How can I use my home network to enhance my home security?
Monitoring cameras: can monitor you when there is a lack of movement or there is
Securing Wireless Networks
Firewalls
Why is a wireless network more vulnerable than a wired network?
Wired networks make it easy to tell if a hacker is using your network
Why should I be worried about someone logging onto my wireless network without my
permission?
Piggybacking: connecting to a wireless network without the permission of the owner, any illegal
actions can be done through your network which is where it becomes traced by the law
enforcement
How is my wireless network vulnerable?
Savvy hackers can intercept and decode information from your transmissions that may allow
them to bypass any standard protections, such as a firewall
1. Change your network name (SSID) server set identifier: you’re advertising that you
haven’t changed any of the other default settings
2. Disable SSID broadcast
3. Change the default password on your router
4. Turn on your security protocols
5. Wired Equivalent Privacy (WEP) or Wifi Protected Access (WPA) (both use encryption to
protect data in your wireless transmissions
6. Implement media access control (MAC) address, only restricted devices can use the
network
7. Limit your signal range
8. Apply firmware upgrades
Configuring Software for your Home Network
Windows Configuration
Is configuring software difficult?
Relatively easy, follow wizard
What if I don’t have the same version of Windows on all my computers?
That’s alright they can coexist
How do I differentiate the computers on my network?
Computer names, homegroup
How do Macs connect wirelessly to networks?
Available networks screen will pop up
Why don’t some networks appear as available?
The SSID broadcast is disabled, just enter search for the network name
Wireless Node Configuration
How do I hook up devices like a TiVo or gaming console to my network?
Know the SSID
How can I test my Internet connection speed?
Speedtest.net
Troubleshooting Network Problems
What types of problems can I run into when installing wireless networks?
Connection obstacles ex. Walls
What If a node on the network can’t get adequate throughput?
Reposition the node within the same room
Wireless range extender: device that amplifies your wireless signal to get it out to pars of your
home that are experiencing poor connectivity
s s e ven
eve n
summary
summary
chapter
5. What equipment and software do I
need to build a network in my home?
All computing equipment that will connect
to a network has to contain a network
adapter. Network adapters allow computers
to communicate (either wired or wirelessly)
with network navigation devices such as
routers and switches. Wired connections are
usually made with Cat 6 twisted pair cable.
A router is needed to share an Internet
connection as it transmits data between
two networks (the home network and the
Internet).
6. Besides computers, what other
devices would I connect to a home
network?
Connecting peripherals such as printers
directly to a network allow them to be easily
shared by all users on the network.
Network-attached storage (NAS) devices
allow for the storage and sharing of data
files such as movies and music as well as
providing a central place for file backups.
Connecting digital entertainment devices
(such as gaming consoles) provides the
ability to stream movies and other
entertainment directly from the
Internet.
7. Why are wireless networks more
vulnerable than wired networks, and
what special precautions are required
to ensure my wireless network is
secure?
Wireless networks are even more susceptible
to hacking than wired networks because the
signals of most wireless networks extend
beyond the walls of your home. Neighbors
may unintentionally (or intentionally)
connect to the Internet through your
wireless connection, and hackers may try
to access it. To prevent unwanted intrusions
into your network, you should change the
default password on your router to make
it tougher for hackers to gain access, use a
hard-to-guess SSID (network name), turn
off SSID broadcasting to make it harder
for outsiders to detect your network, and
enable security protocols such as WPA
or WEP.
1. What is a network, and what are the
advantages/disadvantages of setting
up one?
A computer network is simply two or
more computers that are connected using
software and hardware so that they can
communicate. Advantages of networks
include allowing users to (1) share an
Internet connection, (2) share peripheral
devices, and (3) share files. A disadvantage
is that the network must be administered.
2. What is the difference between a
client/server network and a peer-topeer
network?
In peer-to-peer networks, each node
connected to the network can communicate
directly with every other node instead of
having a separate device exercise central
control over the network. P2P networks are
the most common type of network installed
in homes. Most networks that have 10 or
more nodes are client/server networks. A
client/server network contains two types of
computers: a client computer on which
users perform specific tasks and a server
computer that provides resources to the
clients and central control for the network.
3. What are the main components of
every network?
To function, any network must contain four
components: (1) transmission media (cables
or radio waves) to connect and establish
communication between nodes, (2) network
adapters that allow the nodes on the
network to communicate, (3) network
navigation devices (such as routers and
switches) that move data around the
network, and (4) software that allows the
network to run.
4. Which type of network is most
commonly found in the home?
Ethernet networks are the most common
networks used in home networking. Most
Ethernet networks use a combination of
wired and wireless connections depending
upon the data throughput required. Wired
connections usually achieve higher throughput
than wireless connections.
336 Chapter 7 Networking: Connecting Computing D
8. How do I configure the software on
my computer and set up other
devices to get my network up and
running?
Windows features software wizards that
facilitate the setup of both wired and
wireless networks. Plug in the modem,
routers, and all cables, and then switch on
the modem, router, and computers (in that
order). Run the wizards, which should
guide you through the process. Make sure
each computer has a distinct name and
ensure that all computers are in the same
HomeGroup. Devices such as gaming
consoles each have their own set-up
procedures for connecting to wireless
networks but usually require the same
information as needed for connecting a
computer to a secured wireless network.
summary
9. What problems might I encounter
when setting up a wireless network?
You may not get the throughput you need
through a wireless connection and therefore
you may need to consider a wired connection
for certain devices. Distance from the
router as well as walls, floors, and large
metal objects between a device and the
router can interfere with wireless connectivity.
Wireless range extenders can amplify
signals to improve connectivity in areas of
poor signal strength.
Multiple Choice
1. All of the following are advantages of
installing a home network except
sharing
a. peripherals.
b. an Internet connection.
c. files.
d. MAC addresses.
2. Which of the following is not a reason
client/server networks are generally
not installed in homes?
a. Client/server networks can’t
handle streaming media, which is
often required in home networks.
b. Client/server networks are more
difficult to install than peer-topeer
networks.
c. Client/server networks provide
more security than is needed for
home networks.
d. Peer-to-peer networks are less
expensive to install than
client/sever networks.
3. Which of the following is not required
on some simple networks?
a. Network adapters
b. Networking software
c. Network navigation devices
d. Transmission media
4. Which network navigation device is
required to move data between two
networks?
a. Repeater c. Router
b. Switch d. Hub
5. If you need very fast throughput in a
home network, you should use
a. an 802.11n wireless Ethernet
connection.
b. a wired power-line network.
c. a wired gigabit Ethernet
connection.
d. a client/server network.
6. Wireless range expanders
a. are never used for home
networks.
b. are not needed with 802.11n
networks.
c. improve connectivity in remote
areas of a home.
d. turn devices with wired
connections into wireless
nodes.
7. Two or more networks connected
over long geographic distances to
form a single network is usually
referred to as a
a. LAN. c. HAN.
b. MAN. d. WAN.
8. The throughput of a network
a. is the same on all Ethernet
networks.
b. is usually higher on wireless
networks.
c. is the same in all areas covered by
a wireless network.
d. can vary depending upon the
transmission media used.
9. The “name” of a particular wireless
network is known as the
a. NetID. c. SSID.
b. HAN-ID. d. Wifi-ID.
10. The device used to move data around
a single network is called a
a. gateway.
b. switch.
c. router.
d. repeater.
True–False
___F_ 1. Actual data throughput is usually higher on wireless networks.
___T__ 2. Ethernet networks require each node on the network to be equipped with its own
network adapter.
__T__ 3. WEP and WPA are popular wired network security protocols.
__T__ 4. MANs cover a larger geographic area than HANs.
__T___ 5. 802.11n wireless networks provide faster throughput than wired gigabit Ethernet
networks.
Eight Digital Lifestyle
A digital lifestyle
When did everything go “digital”?
Everything now is digital
What is special about digital?
Analog: sound and light waves that are changing in intensity
What advantages do digital formats have over analog ones?
Digital formats can be reproduced exactly and distributed easily
How can a sequence of numbers express complicated analog shapes?
Analog-to-digital conversion: the incoming analog signal is measured many times each
second, the strength of each measurement is recorded as a simple number
How has the change from analog to digital technologies affected our lifestyle?
Lets find out
Digital Telephony: Communicating with Bits
Telephony: the use of equipment to provide voice communications over a distance, has
shifted from an analog science to a digital one
Cell phones and smartphones
What are cell phones and smartphones?
Cellular phone has evolved from a clunky boxlike device to a compact fully featured
communication and information storage device
Smartphone: more fully featured and powerful cellular phone, that can access the
Internet to upload and download e-mail and data
How do cell phones use digital signals?
The analog-to-digital converter chip converts your voice’s sound waves into digital
signals
The digital signal processor handles the compression work, when you receive a radio
wave the processor decompresses the sound, and then an amplifier boosts the signal to
make it loud enough for the speaker
What’s “cellular” about a cell phone?
A set of connected “cells” makes up a cellular network, each cell is a graphic area
centered on a base transceiver station, which is a large communications tower with
antennas, amplifiers, and receivers and transmitters
Mobile switching center: the center that connects the calls
Are cell phones and smartphones considered computers?
Yes!
What does the processor inside a cell/smartphone do?
Cell processor: responsible for coordinating all the data among the electronic
components inside the phone, it runs the phone’s OS (which runs the user interface)
Different processors for phones are Qualcomm Snapdragon, Texas instruments OMAP,
and Marvell XScale
Is there a standard operating system for cell phones?
Windows Phone 7 series, OS X OS for Apple, Palm Pre uses Palm-developed webOS,
Symbian in Nokia N8 (its also freeware)
What does the memory chip inside a cell phone do?
ROM
What input and output devices do cell phones use?
Microphone and keypad, and camera
What cell phone and smartphone software is available?
Microsoft utility tools, games, applications
How do I move music from my computer to my smartphone?
USB cable, use the flash card reader on the computer
How do I synchronize a cell phone with a computer?
Syncing or synchronizing: the process of updating your files so that the files on your cell
phone and computer are the same
Microsoft has a SyncCenter
Can I transfer files wirelessly?
Bluetooth 1,2, and 3
Is there a way to synchronize to my home computer before I get home?
“cloud computing”, MobileMe from Apple
Text Mesaging
What is text messaging?
Short message service (SMS)
How does SMS work?
Uses the cell phone network to transmit messages
Calling center receives the message and delivers it to the appropriate mobile device
Uses store-and-forward technology: this allows any other SMS device in the world to
receive it
The T9(text on 9 keys) algorithm also “learns” from your patterns and suggests words
Can I send and receive multimedia files using a cell phone?
Multimedia message service (MMS): allowes you to send messages that include text,
sound, images and video clips
Internet Connectivity
How do I get Internet service for my smartphone?
Wireless internet service provider or wireless ISP, data plan: internet connectivity plan
At what speed is digital information transferred to my smartphone?
EDGE (enhanced data rate for global evolution) and 3G, 4G is coming in
How can I survive when I find I have no WiFi signal?
Other devices can make a hotspot for you which is called a MiFi, Verizon wireless has
one
How do smartphones display content from the Internet?
Microbrowser: software provides a Web browser that is optimized to display Web
content effectively on the smaller screen (ex. Internet Explorer Mobile)
Wireless Mark-up Language (WML): websites written for mobile devices
Can I keep my e-mail up to date using my cell phone?
Blackberry push technology, gmail, yahoo
Voice over Internet Protocol
VoIP
How is VoIP different from regular telephone service?
Voice over Internet Protocol (VoIP): form of voice-based Internet communications that
turns a standard Internet connection into a means to place phone calls, including long-
distance calls
What do I need to use VoIP?
Speakers, microphone, an Internet connection, and a VoIP provider (ex. Skype Vonage)
What are the advantages and disadvantages of VoIP?
It’s free or low cost, portable
Setbacks: sound quality, and reliability, loss of service if power is interrupted
What new features come with having an Internet-based digital phone at home?
Other services can be bundled with the VoIP such as TV cable
Cell Phone/Smartphone Security
Can I get a virus on my cell smartphone?
McAfee, Symantec, F-Secure
Virus attacks are increasing
How do I keep my cell/smartphone number private?
Get virtual number from your service provider, ex. Telus
Digital Media and Information
How is digital media created?
Sampling rate: specifies the number of times the analog wave is measured each
second, the higher it is the more accurately the original wave can be re-created
Digital Music
How can I create music files easily?
Portable media players (PMPs): small portable devices that enable you to carry your
MP3 files around with you
Are all music files MP3 files?
No, there’s AAC, WMA, and many video files such as DivX, MPEG-4, Xvid
Are PMP devices the only choice for portable media management?
Digital cameras, gaming devices PSP
How do I know how much digital media a PMP can hold?
Depends on the storage, the built-in flash memory, most are hard drives, depends on
the sampling rate as well
How do you control the size of an MP3 file?
When ripping or converting a song
What is I want to store more music or video than the memory on my PMP allows?
Add flash drives or larger sizes
How do I transfer media files to my portable media player?
Firewire, usb port
What if I want a lot of people to listen to my digital music?
Audio dock, speakers, tv’s, cars
How did the shift to digital music impact the music industry?
MP3.com had problems, Napster fixed this
Napster used peer-to-peer sharing
So if I don’t pay for a music download is it illegal?
Tethered downloads: you pay for the music and own it, but are subject to restrictions on
its use
DRM-free music: music without any digital rights management, the music can be moved
from system to system ex. Apple
Napster to Go
Why buy any music if peer-to-peer (P2P) sharing sites are still operating?
Its illegal
Will PMPs eliminate radio stations?
Radio stations online have good quality music airtime, offer podcasting
Digital Navigation
How has digitized information impacted navigation?
GPS (global positioning system) devices
How do I get GPS in my car?
Portable GPS, PDA/smartphone equipped with GPS, or with the car
How does the GPS system work?
GPS devices uses antenna to pick up the signals to transform them into latitude and
longitude
If I don’t have a GPS, how does the 911 system know where I am?
The Federal Communications Commission (FCC) mandated that every cell phone have
a GPS chip inside it to follow the E911 program to located the precise information for
any 911 call.
Can I use the GPS chip on a child’s cell phone?
Yes there are family tracking plans that can be bought
Do GPS devices carry other information?
MP3 players, internet, msn
Digital Photography
What is “analog” photography?
SLR (single-lens reflex): when the shutter opens light touches the film and a chemical
reaction occurs, the film is later processed
What is the difference about digital photography?
Digital cameras capture images on electronic sensors called charge-coupled device
(CDD arrays) and then convert those images to digital data
How do I select a digital camera?
“Point and shoot models” to more serious SLR cameras
Why not just use the camera on my cell/smartphone?
Lower resolution, no smile shutter: takes a photo when the subject is smiling
What determines the image quality of a digital camera?
Many factors: quality of the lenses used, the file format and compression used, and the
color management software, resolution (number of data points it records for each image
captured) measured as megapixels MP, mega is millions pixel is picture element which
is one dot on a digital image
What file formats are used for digital images?
Most common is raw uncompressed data (RAW), and Joint Photographic Experts
Group (JPEG)
How do I move photos to my computer?
Flash memory card, photo printing machines, USB, wireless network connections the
Eye-Fi
Can I make my old photos digital?
Scanner which converts images as TIFF files, also recorded in dots per inch (dpi),
optical character recognition (OCR) converts handwritten or typed text into electronic
files
How do I print a digital image?
At home with an expensive printer and fancy paper, or at a store such as Wal-Mart and
Target
Do I need to print out my photos?
Online albums, electronic photo frames
Digital Video
Where does digital video come from?
Digital cameras, Google Video, YouTube, Netflix
How do I record my own digital video?
Video equipment stores it in a digital video (DV) format
What if I decide to add some special effects and a sound track?
Video editing software, where a timeline is present in which you can manipulate a video
file, izzy video podcasts help make the most impact with video editing software with raw
video footage
What kinds of files will I end up with?
You can save/export into a variety of options
AVI is popular for sharing among many users
A codec (compression/decompression) is a rule implemented in either software or
hardware that squeezes the same audio and video in formation into less space
Common codecs are MPEG-4, H.264 and DivX
What if I want a DVD with a menuing system?
Use special DVD authoring software such as Pinncale Studio or Adobe Encore DVD
What is the quickest way to get my video out to viewers?
Flip SideHD, just plug in and update the files to the web
How can I distribute my video to the greatest number of viewers?
Podcast on iTunes, ustream, Justin.tv
Are the television shows and movies I watch digital?
Yes
Is all video digital now?
DTV.gov is a site that keeps consumers current on using conversion boxes to allow
older television sets to operate with the new digital signal
Since the conversion of digital TV signals, are there any more free television
signals?
Yes, if you live in an area with good “over-the-air” (OTA) reception, you can pick up any
free local television
How is HD different from “plain” digital?
HD: high definition
What types of connectivity are provided on modern television sets?
At least 3 hdmi ports, wireless adapter, SD card reader, internet
What advantages are there to watching digital video?
Pause, record television, use widgets
(ex. TiVo)
Can I record the digital video that comes over my television?
Digital video recorders (DVRs), also a Personal video recording (PVR) software on your
computer and record cable signal television (BeyondTV, SageTV)
How else can I get digital video to my TV?
Netflix
Can I get digital video to watch on my portable device?
Yes, TiVo allows the transfer of recorded shows to files on your PC, and mobile
devices, Slingbox is where you can be in another room and control and watch your
home television on your notebook
Digital Mobility and Access
Selecting the Right Device
How do I select the right device for my needs?
Notebook, internet tablet
What if I don’t need a phone but do need Internet access?
Internet tablet with WiFi connectivity, Sony Playstation Portable (PSP)
What if I need a large screen and keyboard?
Netbook (ex. Asus Eee PC and Dell Inspiron Mini 10)
What if all I really need is to bring my books with me?
e-books (Amazon Kindle, Sony reader digital book)
Ubiquitous Computing
What is in the future for our digital lifestyles?
Mark Weiser “computing will be woven into the fabric of everyday life until it is
indistinguishable from it” this concept is called ubiquitous computing
“smart things” era is just beginning
How will our lifestyles change as computing becomes everywhere and invisible?
WineM: each bottle is labeled with a radio frequency identification tag when it is stored
by the owner, the owner can ask the wine rack to show juct the Chardonay and LED
lights just show on those bottles, or it alerts when a bottle is removed
How is shopping changing with increasing access to digital information?
Price comparison tool: ShopSavvy and RedLaser
Mobile coupons called mobicoupons, where the barcode is displayed on the
smartphone
How is marketing changing because the ubiquitous computing?
Microsoft tag transforms everyday things in the real world into live links to online
information and entertainment
Marketers also have to be aware of the phenomenon of “crowdsourcing”: checking in
with the voice of the crowd
How will our “ownership” of objects change with the new access to information?
Large item purchases become “subscriptions” like a riding a bike in Germany
Car Share programs
Could ubiquitous computing technology improve the world?
Yes manking a more secure, cleaner, more informative living environment
What if each of the cell phones distributed around the world had integreated
atmospheric sensors?
They could tag flu viruses or weather
e eighitght
summary
summary
chapter
work in the same way as in a computer to
process information and support communications,
software applications, and other
services.
4. Why would I use VoIP, and what does
it offer that is unique?
VoIP allows inexpensive communication
using a computer or a WiFi-enabled phone.
Because it is based on a digital format for information,
it can support services like automatic
delivery of phone messages to an
e-mail account or texts to a mobile device.
5. How is digital media different from
analog?
Digital media is based on a series of numeric
data comprising number values that were
measured from the original analog waveform.
As a string of numbers, a digital photo
or video file can be easily processed by modern
computers.
6. What can I carry in a portable media
player, and how does it store data?
Most PMPs can store any kind of digital information—
photos, videos, or music files for
example. Some PMPs store data on a hard
drive, while others use flash memory. Some
also allow the amount of memory to be upgraded,
while others have a fixed amount of
memory.
1. What are the changes that have
brought us a digital lifestyle?
The increased use of digital information has
led to a period of greater creativity and control
of our data. In a digital format, information
is easy to carry, manipulate, and
exchange. This has led to revolutionary
changes in communication, entertainment
media, and mobile computing.
2. How has the move to digital
information affected the
communication tools important to
both the business world and life
outside of work?
The age of digital information has brought
new opportunities and challenges to businesses.
Some have had to struggle to shift
their business models to the new style of information.
Because information can be
shared so easily, issues of copyright and intellectual
property have become critical. In
our personal lives, we see products that
allow us to interact with information in
ways that had been too expensive or
difficult before.
3. How do cell/smartphone components
resemble a traditional computer, and
how do they work?
Like a traditional computer, a cell/smartphone
has a central processor, memory, and
an operating system. These components
What ways are there for me to create
and to watch digital video?
You can create digital video using any digital
camera, webcam, or digital camcorder.
Digital editing software allows you to add
transitions, effects, and sound tracks. There
are a great many sources of digital video, including
free sources like YouTube and
JustIn, as well as pay-per-view services like
Amazon Video On Demand or cable
providers’ streaming video options.
summary
8. What changes does ubiquitous
computing bring to our lifestyles?
As computers become smaller and less obvious,
they will begin to integrate into our lifelike
appliances rather than be complicated
tools. Ubiquitous computing is beginning to
allow us to move some objects from an ownership
model to a subscription service
model.
399
e eighitght
self-test
self-test
chapter 402 Chapter 8
Digital Lifestyle: Managing Digital Data and Devices
Instructions: Answer the multiple-choice and true–false questions below for more practice
with key terms and concepts from this chapter.
Multiple Choice
1. Which is not a factor that determines
the quality of images taken with a
digital camera?
a. Lens quality c. Resolution
b. File format d. EyeFi
2. Which is the process of ensuring that
two computer devices have the same
data?
a. Mapping
b. Standardizing
c. Synchronizing
d. Transferring
3. The operating system of your cell
phone is stored in
a. read-only memory.
b. the display.
c. the digital signal processor.
d. random-access memory.
4. If you want the lightest, most
portable computing solution, you
would purchase
a. a netbook.
b. a tablet PC.
c. an Internet tablet.
d. a notebook.
5. P2P is an acronym for
a. packet-to-packet networking.
b. peer-to-peer sharing.
c. person-to-person texting.
d. power-to-power delivery.
6. What software makes it possible to
view Web pages on a cell phone?
a. Microbrowser
b. Extension
c. Push technology
d. 3G standard
7. Flash memory is a type of
a. nonvolatile memory.
b. hard drive memory.
c. SSD memory,
d. volatile memory.
8. VoIP is phone service that
a. works even when the electricity
goes out.
b. works over an Internet
connection.
c. requires no special setup for a
secure connection.
d. has extremely high quality and is
very reliable.
9. Which of the following is not true
about modern televisions?
a. They incorporate wireless
connectivity.
b. They allow other services, like
caller ID, to be integrated.
c. They can use widgets to display
sports and news updates.
d. They run word processing and
slide presentation software.
10. Which service allows you use your
cell phone to send messages that
contain images?
a. MMS
b. ISP
c. SMS
d. MiFI
True–False
___T_ 1. All smartphones allow you to add more memory.
___F_ 2. Digital music files must be converted to the MP3 format if they are transferred to a
mobile device.
__T__ 3. A codec is the algorithm that compresses and decompresses video files.
__F__ 4. If your digital camera doesn’t support wireless connectivity, you can use a
memory card with built-in WiFi.
___T_ 5. Some Internet-enabled devices like the Nokia N810 Internet tablet use Skype for
voice communications instead of cell phone service.
Chapter 9: Securing your system
Keeping your Data safe
Cybercrime: malicious computer programs, stealing people’s identities online, attacks
on corporate Web sites
Who perpetrates computer crimes?
Cybercriminals: individuals who use computers, networks, and the Internet to perpetrate
crime
What kinds of cybercrimes are conducted over the Internet?
Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of
Investigation (FBI), and the National White Collar Crime Center (NW3C)
With all the news coverage about cybercrimes, aren’t people being cautious?
No, Messaging Anti-Abuse Working Group (MAAWG)
Are computer viruses a type of cybercrime?
Computer virus: a program that attaches itself to another computer program (known as
host program) and attempts to spread to other computers when files are exchanged
Ex. Conficker virus
Does cybercrime include the theft of computing devices?
No, called larceny
Computer Threats: Computer Viruses
What do computer viruses do?
Replicate itself and copy its code into as many files as possible
Secondary objectives: displaying annoying messages on the computer, destroying files
How does my computer catch a virus?
Peer to peer sharing
Portable hard drive sharing
e-mail
Types of Viruses
Boot-Sector Viruses
What are boot-sector viruses?
Boot-sector virus: replicates itself into a hard drive’s master boot record
Master boot record: program that executes whenever a computer boots up
Often transmitted by a flash drive
Logic bombs and time bombs
What is a logic bomb?
Logic bomb: virus that is triggered when certain logical conditions are met- such as
opening a file or starting a program a certain number of times.
Time bomb: a virus that is triggered by the passage of time or on a certain date
Ex. Blackworm virus
Worms
What is a worm?
Worm is a virus that attempts to travel between systems through network connections to
spread an infection
Installing antivirus software: software specifically designed to detect viruses and protect
your computer and files from harm
Script and Macro Viruses
What are scripts and macro viruses?
Script: a series of commands (mini program)
Macro virus: virus that attaches itself to a document that uses macros (word, excel).
Ex. Melissa: it finds the first 50 people in the address book, and sends itself to them
Encryption Viruses
What are encryption viruses?
Encryption viruses: runs a program that searches for common types of data files (ex.
Word), and compresses them using a complex encryption key that renders them
unusable, the distributor will ask for money to decrypt the files, which makes it flawed
since the transaction can be traced
Virus Classifications
How else are viruses classified?
Polymorphic virus: changes its own code to avoid detection (main type of .exe files)
Multiplier virus: infect multiple file types in an effort to fool the antivirus software that is
looking for it
Stealth virus: temporarily erase their code from the files and hides in the RAM, not a
problem anymore as antivirus programs search RAM as well
Computer Safeguard: Antivirus Software and Software Updates
Symantec, Kaspersky, AVG, McAfee
Antivirus Software
How often do I need to run antivirus software?
Once a week
How does antivirus software work?
Antivirus software looks for virus signatures in files. A virus signature is a portion of the
virus code that is unique to a particular computer virus
Quarantining: putting a virus in a secure area
Inoculation: AV records key attributes about the files on your computer and keeps these
statistics in a safe place on the hard drive, it allows for a file reference to make sure
there isn’t a virus on the file
Does antivirus software always stop viruses?
New virus code is written, so update your antivirus program often
How do I make sure my antivirus software is up to date?
Automatic update feature
What should I do if I think my computer is infected with a virus?
Boot up the computer with the antivirus installation disc
Are instant messenger programs safe from virus attacks?
1. Allow contact only from uses on your Buddy or Friends List
2. Never automatically accept transfers of data
3. Avoid using instant messaging programs on public computers
Software Updates
Is there anything else I should do to protect my system?
Drive-by-download: common, through malicious websites that attack the computer by
downloading harmful software onto the computer
Do updates only happen automatically?
Option 1: install updates automatically
Option 2: download updates but let me choose whether to install them
Option 3: check for updates but let me choose whether to download and install them
Option 4: Give me recommended updates (optional, and necessary)
Option 5: Microsoft Update
Computer Threats: Hackers
Hacker: anyone who unlawfully breaks into a computer system wither a computer or a
network
Are there different kinds of hackers?
White-hat hacker: do the hacking as a challenge, but not break or steal anything
Black-hat hacker: destroy information or gain illegally
What about the teenage hackers who are caught so often?
Script kiddies: teenage hackers that use script from professionals to wreak havoc
Why would a hacker be interested in breaking into my home computer?
Some hackers just like to snoop, the challenge
What hackers steal
Could a hacker steal my credit card number?
Packet sniffer or a keylogger: program that captures all keystrokes made on a computer
What’s a packet sniffer?
Packet: small piece of information travelling through the Internet identified with an IP
address, and once they reassemble into cohesive messages
Packet sniffer: computer program developed by hackers that looks at each packet as it
travels the Internet, vulnerable on wireless networks
What do hackers do with the information they “sniff”?
Sell the information of credit card numbers and login information
Identity theft: someone using personal information about you to assume your identity for
the purpose of defrauding others
Trojan Horses
Besides stealing information what other problems can hackers cause if they
break into my computer?
Trojan horse: a program that appears to be something useful or desirable, but while it
runs does something malicious in the background without your knowledge
What damage can Trojan horses do?
Create backdoor program: allows hackers to take almost complete control of your
computer without your knowledge
Zombie: computer that a hacker controls
Denial of Service Attacks
What are denial-of-service attacks?
Denial-of-services (DoS) attack: legitimate users are denied access to a computer
system because a hacker is repeatedly making requests of that computer system
through a computer he or she has taken over as a zombie
The computer is too busy to allow access, with spam requests
Couldn’t a DoS attack be traced by to the computer that launched it?
Distributor denial-of-service (DDoS) attack
Botnet: a large group of software programs that runs autonomously on zombie
computers
The attack is done by many different computers
How Hackers Gain Access
How exactly does a hacker gain access to a computer?
Direct access involve using the computer directly
What are logical ports?
Logical ports: virtual communications gateways or paths that allow a computer to
organize requests for information (web page downloads ex.) from other networks or
computers
Logical ports are numbered and assigned to specific services, ex. WWB is port 80
Restricting Access to Your Digital Assets
Firewalls
Firewall: a program or hardware device designed to protect computers from hackers
Personal firewall: specifically designed for home networks
Types of Firewalls
What kinds of firewalls are there?
What software firewalls are there?
Norton, McAfee, ZoneAlarm Internet Security Suite
What are hardware firewalls?
Router firewalls
How firewalls work
They protect the computer’s network address, and block access to logical ports
Packet filtering: filter out packets sent to specific logical ports
Logical report blocking: ignore all incoming packets
IP addresses are assigned dynamic addressing from the internet service provider
Static Addresing: assigned IP address
Firewalls use a process of network address translation (NAT) to assign internal IP
addresses on a network
Knowing Your Computer is Secure
How can I tell my computer is at risk?
Gibson Research, ShieldUP
What if I don’t get a clean report from the testing program?
Get a firewall, or configure current one
Preventing Bluetooth Attacks
What are the security vulnerabilities of Bluetooth devices?
Bluesnarfing: exploiting a flaw in the Bluetooth access software for the purpose of
accessing a Bluetooth device and stealing the information contained on it
Car Whisperer eavesdrops on conversations taking place in your car
Bluebugging: (more dangerous) hacker must take control of a blue tooth device and
making phone calls and accessing the Internet etc..
Reverse SMS: process of making small purchases with the cell phone bill
How can I protect myself from Bluetooth attacks?
Make your Bluetooth invisible
Bluetommorow: antivirus software
Password Protection and Password Management
John the Ripper
Creating Passwords
What constitutes a strong password?
Several different characters that don’t constitute of words
How can I check the strength of my passwords?
Password meter, Microsoft’s test
How can I use a password to restrict access to my computer?
Managing Your Passwords
How can I remember all of my complex passwords?
Where can I obtain password-management software?
Anonymous WebSurfing: Hiding from Prying Eyes
Should I be concerned about surfing the Internet on shared or public computers?
What tools can I use to protect myself when using public computers?
IronKey, has everything done from the flash stick
Biometric Authentication Devices
Besides passwords, how else can I restrict the use of my computer?
Biometric authentication device: reads fingerprint or iris pattern on the eye
Managing Online Annoyances
Malware, Adware, and Spyware
What is malware?
Malware: software that has a malicious intent there are three forms:
Adware, Spyware: known as grayware which are annoying or objectionable online
programs that are downloaded to your computer when you install free stuff
Viruses are the third
What is adware?
Adware: software that displays sponsored advertisements in a section of your browser
window or as a pop-up ad box
What is spyware?
Spyware is an unwanted piggyback program that usually downloads with other software
you want to install from the Internet, and runs in the background of the system. It
transmits information about you, your habits.
Ex/ keystore logger: monitors keystrokes with the intent of stealing passwords, login IDs
or credit card information
Can I prevent spyware?
Big Brother is Watching
Cyberloafing: cyberslacking, means doing anything with a computer while you are being
paid to do your job, that is not an approved funcrtion of your job
Spam
How can I best avoid spam?
Spam: uwanted or junk e-mail
Spam filter: you can select in your e-mail account that places known or suspected spam
messages into a folder other than your inbox
How do spam filter work?
Filters message content and headers such as “free”
How else can I prevent spam?
Don’t accept agreements that allow for the selling of your email address
Cookies
What are cookies?
Cookies (aka tracking cookies): small text files that some Web sites automatically store
on your computer’s hard drive when you visit them
What do Web sites do with cookie information?
Gives information about your browsing habits
Used for marketing strategy to determine the effectiveness of its content
Can companies get my personal information when I visit sites?
Only obtains the information you fill out forms with
Do privacy risks exist with cookies?
Yes, companies examine information
Should I delete cookies from my hard drive?
No security threats, no real need to delete
Cookie Pal can help monitor cookies
Protecting Yourself…from Yourself!
Protecting Your Personal Information
What information should I never share on Web sites?
SS#, birthdate, school
How can I tell who can see my information in a social network?
Privacy settings
How can I protect my information on Facebook?
Settings
Backing Up Your Data
How might I damage the data on my computer?
1. Unauthorized access
2. Tampering
3. Destruction
What types of files do I need to back up?
Program file: used to install software and usaually comes on CDs or DVDs
Data file: file you created or purchased
Are there different ways to back up my files?
Incremental backup (partial back up): backing up only files that have changed or been
created since the last backup was performed
Image backup (system backup): all system, application, and data files are backed up,
not just files that changed
How often should I back up my files?
Depends on how often you make changes
Where do the backups of my files reside?
1. Online sites ex. Skydrive, adrive, iron mountain, ibackup
2. Local drives: external drives
3. Network-attached storage devices and home servers: NAS (network-attached
storage) device: large hard drives that are connected to a network of computers
How do I actually perform a file backup?
Should I back up my files that are stored on my school’s network?
Yes!
Social Engineering: Fooling the Unwary
What is social engineering?
Social engineering: any technique that uses social skills to generate human interaction
that entices individuals to reveal sensitive information (telephone scams)
How does social engineering work?
Use a pretext: involves creating a scenario that sounds legitimate enough that someone
will trust
Phishing and Pharming
How are phishing schemes conducted?
Phishing: lures internet users to reveal personal information such as credit card
numbers (ex. Email that require security information confirmation)
Is pharming a type of phishing scam?
Pharming: malicious code is planted on your computer that leads a user to a fake
website to the intended one. It is exactly the same in appearance.
How can I avoid being caught by phishing and pharming scams?
Never reply to e-mail
Use virtual credit card number
Hoaxes
What is a hoax?
Hoax: attempt to make someone believe something that is untrue
Why do people concoct e-mail hoaxes?
Urban legend: hoaxes that become accept as true
How can I tell if an e-mail is a hoax?
Snopes. Com , hoax-slayer, truthorfiction
Protecting Your Physical Computing Assets
Environmental Factors
Why is the environment critical to the operation of my computer equipment?
Avoid excessive heat or cold, keep in a clean room to avoid dust
Power Surges
What is a power surge?
Power surge: occur when electrical current is supplied in excess of normal voltage
Surge protector: device that protects your computer against power surges
How do surge protectors work?
Surge protectors contain two components that are used to protect the equipment:
Metal-oxide varistors (MOVs) bleed off excess current during minor surges and feed it
to the ground wire, while still passing electricity to the device
During major surges a fuse inside the surge protector blows, which stops the flow of
current to all devices plugged into the surge protector.
Besides my computer, what other devices need to be connected to a surge
protector?
Whole-house surge protector
Is my equipment 100% safe when plugged into a surge protector?
Some can be 2 overwhelming
How can I prevent my computers from losing power during a power outage?
Uninterruptible power supply (UPS): has surge protection and power supply
Deterring Theft
Alarms
What type of alarm can I install on my notebook computer?
Monitor alarm: uses a mall device called a key fob activator or punch in a code to
activate the alarm (if moved it sounds)
Locks and Surrounds
How can I lock up a notebook computer?
Chaining
Software Alerts
How can my computer alert me when it is stolen?
LoJack: theft tracking device, with a transmitter
Computrace LoJack
What if the thieves find the tracking software and delete it?
Files are not visible
Are there ways to protect data contained on mobile devices?
TealLock offers additional protection features such as data encryption, and protection
against data bomb software which destroy data on both internal and external data cards
How can I ensure that I’ve covered all aspects of proteting my computer?
nine
summary
chapter
5. How do I create secure passwords
and manage all of my passwords?
Secure passwords contain a mixture of
upper- and lowercase letters, numbers, and
symbols, and are at least 14 characters long.
Passwords should not contain words that
are in the dictionary or easy-to-guess personal
information (like your pet’s name).
Online password checkers can be used to
evaluate the strength of your passwords.
Utilities built into Web browsers and Internet
security software can be used to manage
your passwords and alleviate the need to remember
numerous complex passwords.
6. How can I surf the Internet
anonymously and use biometric
authentication devices to protect my
data?
The current versions of the popular
browsers include tools (such as Chrome’s
Incognito feature) that hide your surfing activities
by not recording Web sites that you
visit, or files that you download, in your
browser’s history files. Biometric authentication
devices use a physical attribute (such as
a fingerprint) that is not easily duplicated to
control access to data files or computing devices.
Some notebooks today feature fingerprint
readers and facial recognition software
to control access.
7. How do I manage online annoyances
such as spyware and spam?
The Web is filled with annoyances such as
spam, pop-ups, cookies, spyware, and scams
such as phishing that make surfing the Web
frustrating and sometimes dangerous. Software
tools help to prevent or reduce spam,
adware, and spyware, while exercising caution
can prevent serious harm caused by
phishing, pharming, and other Internet
scams and hoaxes.
1. From which types of viruses do I
need to protect my computer?
A computer virus is a program that attaches
itself to another program and attempts to
spread to other computers when files are exchanged.
Computer viruses can be grouped
into five categories: (1) boot-sector viruses,
(2) logic bombs and time bombs, (3) worms,
(4) scripts and macros, and (5) encryption
viruses. Once run, they perform their
malicious duties in the background and are
often invisible to the user.
2. What can I do to protect my computer
from viruses?
The best defense against viruses is to install
antivirus software. You should update the
software on a regular basis and configure it
to examine all e-mail attachments for
viruses. You should periodically run a
complete virus scan on your computer to
ensure that no viruses have made it onto
your hard drive.
3. How can hackers attack my
computing devices, and what harm
can they cause?
A hacker is defined as anyone who breaks
into a computer system unlawfully. Hackers
can use software to break into almost any
computer connected to the Internet (unless
proper precautions are taken). Once hackers
gain access to a computer, they can potentially
(1) steal personal or other important
information, (2) damage and destroy data,
or (3) use the computer to attack other
computers.
4. What is a firewall, and how does it
keep my computer safe from
hackers?
Firewalls are software programs or hardware
devices designed to keep computers
safe from hackers. By using a personal firewall,
you can close open logical ports to invaders
and potentially make your computer
invisible to other computers on the Internet.
8. What data do I need to back up, and
what are the best methods for doing
so?
Data files created by you (such as Word and
Excel files) or purchased by you (such as
music files) need to be backed up in case
they are inadvertently deleted or damaged.
Application software (such as Microsoft
Office) may need to be reinstalled if files are
damaged, so backups (usually the DVDs or
CDs the application came on) must be
maintained. Web sites such as Adrive and
Skydrive are great for backing up individual
files. External hard drives are popular
choices for holding image backups of your
entire system. Windows 7 and OS X contain
solid backup tools that help automate
backup tasks.
9. What is social engineering, and how
do I avoid falling prey to phishing and
hoaxes?
Social engineering schemes use human interaction,
deception, and trickery to fool
people into revealing sensitive information
such as credit card numbers and passwords.
Phishing schemes usually involve e-mails
that direct the unwary to a Web site that
summary
appears to be legitimate (such as a bank site)
but is specifically designed to capture personal
information for committing fraud. To
avoid phishing scams, you should never
reply directly to any e-mail asking you for
personal information, and never click on a
link in an e-mail to go to a Web site. You can
research topics you believe to be hoaxes at
sites such as Snopes (snopes.com).
10. How do I protect my physical
computing assets from environmental
hazards, power surges, and theft?
Computing devices should be kept in clean
environments free from dust and other
particulates and should not be exposed to
extreme temperatures (either hot or cold).
You should protect all electronic devices
from power surges by hooking them up
through surge protectors, which will
protect them from most electrical surges
that could damage the devices. Notebook
computers can be protected from theft
either by attaching alarms to them or by
installing software that will help recover
the computer, if stolen, by reporting the
computer’s whereabouts
Multiple Choice
1. Computer viruses that hide in memory
to escape detection are known as
a. logic bombs.
b. Trojan horses.
c. stealth viruses.
d. multipartite viruses.
2. Viruses that that feature a series of
commands hidden on a web site are
called
a. boot-sector viruses.
b. script viruses.
c. polymorphic viruses.
d. time bombs.
3. Antivirus software segregates
infected files to prevent further
spread in a process known as
a. inoculation. c. disinfection.
b. quarantine. d. eradication.
4. Hackers without sophisticated
computer knowledge who use tools
developed by others to break into
systems are called
a. black-hat hackers.
b. script kiddies.
c. amateur hackers.
d. white-hat hackers.
5. Which are programs that pretend to
be a useful program but do something
malicious on your computer?
a. Trojan horses
b. Backdoor programs
c. Zombies
d. Spyware
6. Large groups of software programs
that run automatically on many
computers at the same time often
to perpetrate DoS attacks are
known as
a. Trojan horses.
b. backdoor programs.
c. zombie webs.
d. botnets.
7. When hackers use many zombie computers
to launch an attack on another
computer or Web site, the attack is
known as a
a. zombie infestation.
b. distributed denial-of-service
attack.
c. phishing attack.
d. pharming plague.
8. Which are the virtual pathways into a
computer that firewalls close?
a. Packet gateways
b. IP addresses
c. Logical ports
d. Data paths
9. Programs that download to your
computer, usually without your
knowledge, for the purpose of collecting
information, is a type of cyberannoyance
known as
a. pharmware.
b. adware.
c. spyware.
d. bloatware.
10. A backup of the entire contents of
your hard drive is knows as
a. a system backup.
b. an incremental backup.
c. an image backup.
d. an incremental backup.
True–False
_F___ 1. An incremental backup back ups all files on your computer in a specified location.
__T__ 2. Even a properly installed surge protector may fail to protect a computer from all
power surges.
__T__ 3. Phishing is a form of social engineering.
__F__ 4. When malicious code is planted on your computer that interferes with your
browser’s ability to find Web addresses, it is known as phishing. (its pharming)
__T__ 5. If a password includes numbers, symbols, and upper- and lowercase letters, it is
considered to be a strong password.
Ten: Behind the scenes: building applications
Understanding Software Programming
Why would I ever need to create a program?
To do something with a software program that hasn’t been created yet
If I’m not going to be a programmer, why do I need to know some programming?
Creating macros for the computer
The Life Cycle of an Information System
Information system: includes data, people, procedure, hardware, and software, that work
together
The system needs to work together towards a common goal and in order for that to occur an
organizaed process must be followed to ensure the development proceeds in an orderly
process
The steps are referred to as the system development life cycle (SDLC)
System Development Life Cycle
Why do I need a process to develop a system?
Because programs need to be available for multiple operating systems, work over networked
environments, and be free of errors and well supported
What steps constitute the SDLC?
Six steps:
1. Problem and opportunity identification
2. Analysis: explore in depth problem to be solved
3. Design: using flowcharts (visual diagrams of a process, including the decisions that must
be made along the way) and data-flow diagrams (trace all data in an information system
from the point at which data enters the system to its final resting place (storage or
output)), ideas can be outsourced as well or bought
4. Development and Documentation: actual programing takes places
5. Testing and Installation: make sure the program works, and installing it so that it can be
used
6. Maintenance and Evaluation: monitor the program to ensure it is still meeting the needs
of the end users, search for bugs (errors)
The Life Cycle of a Program
What is programming?
Programming: process of translating a task into a series of commands a computer will use to
perform that task
How do programmers tackle a programming project?
Program development cycle (PDLC)
1. Describing the problem: in a problem statement that describes how the software
program will behave
2. Making a plan: the problem statement is translated into a set of specific, sequential steps
that describe exactly what the computer program must do to complete the work
(algorithm is the steps of this stage)
3. Coding: the algorithm is translated into programming code, 1s and 0s
4. Debugging: programmers find and repair any known errors in the code
5. Finishing the Project: software is tested by both the programmers and the people who
use the program, finally the users are trained so that they can use the program efficiently
Describing the Problem: The Problem Statement
Problem statement: starting point of programming work, it’s a clear description of what tasks the
computer program must accomplish
What kind of problems can computer programs solve?
Many simulative and problem solving ones
How do programmers create problem statements?
3 things:
1. Data is the raw input that users have at the start of the job
2. Information: result or output that users require at the end of the job
3. Method: describes precisely the process of how program converts the inputs into the
correct outputs
Three elements again:
1. Data (input):, the data, the number of hours
2. Information (Output): the problem, what is your total pay for the day
3. Method (process): hours of work * wage
How do programmers handle bad inputs?
Error handling with invalid user inputs, testing plan: specifies the typical inputs from the user
Does the testing plan cover every possible use of the program?
The testing plan would describe how the error would be managed or how the output would be
generated for each input category
Is there a standard format for a problem statement?
Usually the same pattern
Making a Plan: Algorithm Development
Do algorithms appear only in programming?
Algorithm is the layout of specific plan to encapsulate all the choices you need to making in the
course of completing a particular task
Algorithm: series of steps that is completely know: at each point we know exactly what step to
take next
What are the limitations of algorithms?
Random events which change the outcomes
How do programmers represent an algorithm?
Flowchart, where the diamonds mean yes or no, and rectangle indicates an instruction to follow
Pseudocode: text-based approach to documenting an algorithm
It’s organized with different levels of indentation to indicate the flow of actions within the
program
Developing an Algorithm: Decision Making and Design
How do programmers develop an algorithm?
Algorithms with choices in the complex problems are called decision points: places where the
program must choose from an array of different actions based on the value of its current input
What kind of decision points are there?
fork in the road/ branch, these are binary decisions
loop: actions are performed until there is a no in the algorithm where it follows another loop
ex. 1. Beginning point or initial value is $0.
2. A set of actions that will be performed
3. a check to see whether the loop is complete, called a test condition
Control structures: the general term used for keywords in a programming language that allows
the program to control (redirect) the flow of the program based on a decision.
How do programmers create algorithms for specific tasks?
Top-Down Design
What is top-down design?
Top down design is a systematic approach in which a problem is broken into a series of high-
level tasks
The task is repeatedly broken down into more detailed subtasks
How is top-down design used in programming?
Object-Oriented Analysis
What is object-oriented analysis?
Object oriented analysis: programmers first identify all of the categories of inputs that are part of
the problem the program is trying to solve, these categories are called classes
Classes are nouns and methods are verbs
Programmers define the classes, data and methods
Different examples of a class is an object (employee names)
Why would a developed select the object-oriented approach over top-down design?
Object-oriented designs leads to reusability
Inheritance: a new class can automatically pick up all of the data and methods of an existing
class, and then extend and customize those to their own specific needs
Original class is called base class, and the modified is called derived class
Ex. Different derived classes from the base class of shape
Coding: Speaking the Language of the Computer
How is a person’s idea translated into CPU instructions?
Coding: act of translating an algorithm into a programming language
How exactly do programmers move from algorithm to code?
Exam the steps and sequences of the algorithm, once the required information and flow is
determined the programmer can begin coding
Categories of Programming Languages
What exactly is a programming language?
Programming language: kind of ‘code’ for the set of instructions CPPU knows how to perform
What kinds of programming languages are there?
Classified in several major groupings/ generations, in how the computers were built and
functioned
How have modern programming languages have evolved?
First generation language (1GU): actual machine language of a CPU the 1’s and 0’s the
computer understands
Second generation language (2GL): assembly language that allows programmers to write their
programs using a set of short English-like commands that speak directly to the CPU and give
them programmer direct control of hardware
Third generation language (3GL): uses symbols and commands to help programmers tell the
computer what to do, ex. BASIC, FORTRAN, COBOL, C/C++, and Java
Fourth-generation language (4GL): structured query language that is a database programming
language
Fifth-generation language (5GL): “more natural” languages, ex. PROLOG Programming Logic
Using lots of rules that are mainly text based
Do programmers have to use a higher-level programming language to solve a problem
with a computer?
No, but higher level languages offer greater portability between OS’s, and that more time and
energy can be spent on solving the problem rather than fixing the structure of the program
The building blocks of programming languages:
Syntax: agreed upon set of rules defining how a language must be structured
Statements: formal syntax in code
Keywords: set of words that have predefined meanings for a particular language, they translate
the flow of the algorithm into the structured code of the programming language
Creating Code: Writing the Program
What happens first when you write a programme?
Variable needs to be announced early in the program so that memory space can be set aside
Variable declaration: tells the operating system that the program needs to allocate storage
space in RAM
Ex. Int Day;
Int= integer and that it will always be a number
After the RAM space is found, it is reserved as long as the program is running
C++ float TotalPay;, float is a number variable as well
Data types: describe the kind of data that is being stored at the memory location, so that
memory can be allocated as efficiently as possible
Int: integers, float: real numbers, char: characters, and bool: Boolean values (true-false)
Operators: coding symbols of the language
<<, &&, +-*/
Can programmers leave notes to themselves inside a program?
Programmers can insert a comment/remark, the compiler ignores the comments and the notes
can be seen by other programmers “//”
What would completed code for a program look like?
Are there ways in which programmers can make their code more useful for the future?
Reusable components: functions, methods, procedures, subroutines, modules, or packages
Compilation
How does a programmer move from code in a programming language to 1s and 0s the
CPU can understand?
Compilation: process which code is converted into machine language 1s and 0s
Compiler: program that understands both the syntax of the programming language and the
exact structure of the CPU and its machine language, it can read the “source code”
Separate versions of the compiler are required if you want to compile code that will run on
separate processor types
Programmers have now made an executable program, .exe which is stored in 1s and 0s
language
Does every programming language have a compiler?
Some use interpreter instead
Interpreter: translates the source code into an intermediate form, line by line (good for coding
stage)
Compilation process takes longer because all of the source code is translated into machine
language before any lines are executed
Coding Tools: Integrated Development Environments
Are there any tools that make the coding process easier?
Compiler products feature an:
Integrated development environment (IDE): development tool that helps programmers write,
compile, and test their programs (ex. Microsoft Visual Studio using C++)
How does an IDE help programmers when they are typing the code?
Code editing: step in which programmers physically type the code into the computer
IDE includes an editor: a special tool that helps programmers as they enter the code,
highlighting keywords, and altering them to typos
How does the IDE help programmers after code is finished?
It shows how many syntax errors have been identified, and how many warnings have been
generated as well as there location
Debugging: Getting Rid of Errors
Debugging: running the program over and over and to make sure the program behaves in the
way it should
How do programmers know whether there is anything wrong with their program?
Make sure the program input values are tested any way possible to look for bugs that might
occur
Is the testing plan reveals errors, why does the program compile?
Program can’t decide whether the programmer wrote is logical, the compiler only can make sure
that the specific rules of the language are followed
Logical errors occur only when the program executes
Runtime error: when something isn’t possible to do (ex. Divide by 0)
Are there tools that help programmers find logical errors?
A debugger is used that helps programmers dissect a program as it runs (the program can be
run in slow motion and the programmer can see the steps that are being executed)
Finishing the Project: Testing and Documentation
Internal testing: a group within the software company uses the program in every way it can
imagine, where any problems are recorded
External testing: testing round people that will eventually purchase and use the software
What other testing does the code undergo?
A free or reduced cost beta version to certain test sites or to interested users
What happens if problems are found after beta testing?
The problems will get fixed and the RTM (release to manufacturers) is issued and the product is
in GA (general availability) and can be purchased by the public
Problems found after GA requires software updates or service packs
After testing, is the project finished?
Documentation is still required
Documentation: describes the development and technical details on how the code works, and
how the user interacts with the program, and training begins to teach new users how to use it
efficiently
Programming Languages: Many Languages for Many Projects:
What languages are popular today?
C/C++ and Java
How do I know which language to study first?
Pascal the only modern language that was specifically designed as teaching language, but now
C++ and Java is being taught
How does anyone learn so many languages?
Most languages have the common basic components
Selecting the Right Language
How do programmers know which language to select for a specific project?
Space available: not all programs require the same amount of space
Speed required: some languages can execute more efficiently than others can
Organizational resources available: how many programmers are available to work on the code
Type of target application: Windows, Linux, OS X
Windows Applications
What languages do programmers use if they want to build a Windows application?
The programs have common features such as scroll bars, title bars, and text boxes
Can I just point and click to create a Windows application?
Yes, through visual programming: which helps programmers produce a final application much
more quickly
Visual Basic
What if programmers want to have a model of their program before it’s fully developed?
A format other than the System development life cycle (SDLC), is building a prototype at the
beginning of a large project
Prototyping is a form of rapid application development (RAD): an alternative to the waterfall
approach, RAD is used in Microsoft Visual Basic (VB)
VB is quick and simple interface, it has grown from BASIC (beginner’s all-purpose symbolic
instruction code)
VB 2010 and .NET Framework are both part of Visual Studio 2010 which provides a complete
set of develop tools
How does the Microsoft .NET Framework help programmers?
Microsoft .NET Framework: software development environment designed to let Web sites “talk”
to each other easily
Web service: program that a Web site uses to make information available to other Web sites
C and C++
What languages do programmers use if the problem requires a lot of “number
crunching”?
C/C++
Why was the C language developed?
C was developed for system programmers; it was supposed to make accessing the operating
system easier
C++ is C to an object oriented level
Are C and C++ natural choices when I’m looking to learn my first language?
The notation is easy to master
They use small amounts of memory, and their basic components are common to many other
languages
Java and C#
What language do programmers use for applications that need to collect information
from network computers?
Java, and C# (sharp)
Can a Java application work on any type of computer?
No, the Java program does not care which CPU, OS, or user interface is
Target computers run a Java Virtual Machine software that can explain to the Java program
how to function on any specific system
Java applet: small Java-based program
Even though Java isn’t as fast as C++ it only needs to be compiled once, that’s why its special!
Web Applications: HTML/XHTML and Beyond
What is the most basic language for developing Web applications?
HTML: hypertext markup language and XHTML: extensible hypertext markup language have
tags that that control how a Web browser will display the text, images, and other contents
Are there tools that help programmers write in HTML and XHTML?
Adobe Dreamweaver and Microsoft Expression Web
Scripting Languages for the Web
Which programming languages do programmers use to make complex Web pages?
Use a scripting language: a simple programming language that is limited to formatting a set of
specialized tasks (ex. JavaScript, VBScript, and PHP)
JavaScript: a subset of Java
Are there other scripting languages beside JavaScript?
VBScript: a sunset of visual basic
Dynamic decision making: the page can decide how to display itself based on the choices the
reader makes
ASP, JSP, and PHP
How are interactive Web pages built?
Active Server Pages (ASP), Java Server Pages (JSP), or PHP (Hypertext Preprocessor)
Automatic writing in the custom HTML/XHTML page that is returned to the user’s computer
What does additional programming bring to a Web page?
Check boxes, filters and buttons
(ex. Browsing an online store)
Flash and XML
What if a programmer wants to create a Web page that includes sophisticated animation?
Adobe Flash: software product for developing Web-based multimedia
Flash includes its own script: ActionScript which is similar to JavaScript
Microsoft has released Silverlight
Other advances: AJAX (Asynchronous JavaScript and XML), allows the creation of Web
applications that can update information on a page without requiring the user to do a page
refresh or leave the page
Is HTML/XHTML the only markup language for the Web?
eXtensible Markup Language (XML): enables designers to define their own data-based tags,
making it much easier for a Web site to transfer the key information on its page to another site
XML allows for common tags to be used so that a Website could look up information from other
websites such as Stocks
The Next Great Language
What will be the next great language?
Language
Objective C an object-oriented C for Mac OS X
Will all languages someday converge into one?
There will be specific programs to make them run more efficiently
So what do I do if I want to learn languages that will be relevant in the future?
Depends on the demand
te n t en
summary
summary
chapter
the input data that users will have at the
start of the job, the output that the program
will produce, and the exact processing that
converts these inputs to outputs. In addition,
the problem statement identifies potential
errors and plans to address these errors.
4. How do programmers create
algorithms?
For simple problems, programmers create
an algorithm by converting a problem statement
into a list of steps (or actions) the program
will take. For more complex problems,
programmers must identify where decision
points occur in the list of steps. Some decisions
are yes/no (binary), whereas others
create a repeating action (loop). Algorithms
are documented in the form of a flowchart
or in pseudocode. Programmers use either
top-down or object-oriented analysis to
produce the algorithm.
5. How do programmers move from
algorithm to code, and in what
categories of language might they
code?
Computer code uses special words and strict
rules to enable programmers to control the
CPU without having to know all of its hardware
details. Programming languages are
classified in several major groupings, sometimes
referred to as generations, with the first
generation being machine language—the binary
code of 1s and 0s that the computer understands.
Assembly language is the next
generation; it uses short, English-like commands
that speak directly to the CPU and
give the programmer direct control of hardware
resources. Each successive generation
in language development has relieved programmers
of some of the burden of keeping
track of what the hardware requires and
more closely matches how humans think
about problems.
6. How does a programmer move from
code in a programming language
to the 1s and 0s the CPU can
understand?
Compilation is the process by which code is
converted into machine language, the language
the CPU can understand. A compiler
1. What is a system development life
cycle, and what are the phases in the
cycle?
An information system includes data, people,
procedures, hardware, and software.
Teams of individuals are required to develop
systems. Those teams need to follow
an organized process (or set of steps) to
ensure that development proceeds in an
orderly fashion. This set of steps is usually
referred to as the system development life
cycle (SDLC). There are six steps in the
SDLC waterfall model discussed earlier in
this chapter: (1) A problem or opportunity is
identified. (2) The problem is analyzed, and
a program specification document is created
to outline the project objectives. (3) A
detailed plan for programmers to follow
is designed using flowcharts and data-flow
diagrams. (4) Using this plan, the program
is developed and documented. (5) The
program is tested to ensure that it works
properly and is installed so that it can be
used. (6) Ongoing maintenance and
evaluation ensure a working product.
2. What is the life cycle of a program?
Each programming project follows several
stages from conception to final deployment.
The problem statement identifies the task to
be computerized and describes how the software
program will behave. An algorithm is
developed that specifies the sequence of
steps that the program must take to complete
the work. The algorithm is then translated
into highly structured programming
code. The code goes through the processes
of debugging, in which the programmers
find and repair any errors in the code; testing
by the programming team; and further
testing by the people who will use the program.
The results of the entire project are
documented for the users and the development
team. Finally, users are trained so that
they can use the program efficiently.
3. What role does a problem statement
play in programming?
The problem statement is an explicit
description of what tasks the computer
program must accomplish and how the
program will execute these tasks and
respond to unusual situations. It describes
is a program that understands both the syntax
of the programming language and the
exact structure of the CPU and its machine
language. It can translate the instructions
written by programmers in the higher-level
language into machine language, the binary
patterns that will execute commands on the
CPU. Each programming language has its
own compiler. Separate versions are required
to compile code that will run on each different
type of processor.
7. How is a program tested?
If programmers make errors in the algorithm
or in translating the algorithm to code,
problems will occur. Programmers debug
the program by running it constantly to find
errors and to make sure the program behaves
in the way it should. Once debugging
has detected all the code errors, users, both
within the company and outside the company,
test the program in every way they
can imagine—both as it was intended to be
used and in ways only new users may think
up. Before its commercial release, software is
often provided at a reduced cost or no cost
in a beta version to certain test sites or to interested
users for a last round of testing.
8. What steps are involved in
completing the program?
Once testing is complete, technical writers
create internal documentation for the program
and external documentation that will
be provided to users of the program. User
training, which begins once the software is
distributed, teaches the user community
how to use the software efficiently.
9. How do programmers select the right
programming language for a specific
task?
A programming team reviews several considerations
before selecting the language.
First, certain languages are best used with
certain problems. Second, the target language
should be well matched to the
amount of space available for the final program.
Third, some projects require the selection
of a language that can produce code
that executes in the fastest possible time.
Finally, selecting a language with which the
programmers are familiar is also helpful.
10. What are the most popular
programming applications for
Windows and Web applications?
Visual Basic, C/C++, and Java are languages
that enable programmers to include
Windows control features such as scroll
bars, title bars, text boxes, buttons, and
expanding and collapsing menus. Programmers
use HTML/XHTML tags to structure
for Web pages. For more complex Web
development, scripting programs such as
JavaScript and VBScript are popular. Web
page animations are done with ASP, JSP,
PHP, Flash, and XML.
507
te n t en
self-test
self-test
chapter
6. A yes/no decision point in an algorithm
is called
a. a loop.
b. a binary decision.
c. a test condition.
d. a control structure.
7. In object-oriented analysis, classes are
defined by their
a. objects and data.
b. data and methods.
c. operators and objects.
d. behaviors and keywords.
8. Which is NOT an advantage of Java?
a. Java is architecture neutral.
b. Java needs to compile only once
prior to distribution.
c. Java supports network
communications.
d. Java performs faster than C__.
9. Which is TRUE about XML?
a. XML supports the development
of rich multimedia.
b. XML makes it possible to update
Web pages without refreshing.
c. XML enables designers to define
their own data-based tags.
d. XML has classes that represent
drop-down lists and other Web
elements.
10. Which helps programmers write,
compile, and test programs?
a. IDE
b. RAD
c. JAD
d. PDLC
1. In the SDLC, which is the phase in
which the program specification is
developed?
a. Problem and opportunity
identification
b. Analysis
c. Design
d. Development and documentation
2. The step of the SDLC in which the
“make or buy” decision is made is the
a. problem and opportunity phase.
b. analysis phase.
c. design phase.
d. development and document
phase.
3. The steps that describe exactly what
the computer program must do to
complete the work is
a. a debugger.
b. a problem statement.
c. an algorithm.
d. the SDLC.
4. What do companies provide to repair
code errors for a program that has
been released to the public?
a. Beta versions
b. Service packs
c. Documentation updates
d. Maintenance programs
5. Which language is best for executing
numerically intensive calculations?
a. C/C__
b. Objective C
c. Java
d. ASP
510 Chapter 10 Behind the Scenes: Building Applications
Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.
Multiple Choice
True–False
___F_ 1. When producing the fastest executable program is essential, programmers use a
language with an interpreter.
___T_ 2. Companies release service packs to repair problems after software has been made
commercially available.
___F__ 3. Comments that programmers insert to explain the purpose of the code are written
in binary.
___F_ 4. Each step of the SDLC must be completed before moving on to the next.
___T_ 5. Programmers often use ActionScript to code prototypes for Windows applications.
Eleven: Behind the scenes: databases and information systems
Life without Databases
Database: collection of related data that can be easily stored, sorted, organized and queried
Ex. Facebook news feed and your specified filtering preferences to what you think is relevant
Should I use databases for managing all types of data?
Not every situation, if there isn’t that much information of sorted on a list already
When is a list not appropriate?
If complex information needs to be organized or more than one person needs access to it, a list
not an efficient solution
Ex. Your contact info. To others you know
What’s the problem with having two lists?
Data redundancy: retyping information ex. University student members who enrol every
semester
Data inconsistency: if information changes, multiple lists must be updated, and would be easy to
overlook some lists, or how a certain piece of information is entered psyc vs. psychology
Aside from data redundancy and inconsistency, are there any other problems with using
lists instead of databases?
Members might be logged twice, such as a billing
Can’t I just exercise caution and set rules for updating lists?
Still room for errors, inability of the data to be shared, data redundancy
How can I solve the problems associated with lists?
Databases
Advantages of Using Databases
How do databases make our lives easier?
They: enable information sharing, promote data integrity, and allow flexible use of data
How do databases make information sharing possible?
Provide data centralization, where there is no need for multiple lists
How do databases promote data-integrity?
Data integrity: data contained in the database is accurate and reliable
Data centralization: ensures data integrity, information is maintained only in one place
How do databases provide flexibility?
Many different users can access the data, and pull out required information accurately and
consistently
Are there any disadvantages associated with databases?
Databases are more complex to construct and administer
You may need a database administrator: an individual trained in the design and building of
databases to assist with the construction of large databases
Data privacy concerns ex. Social security #
Database Terminology
How is data stored in a database?
Fields, records, and tables/files
Fields
What is a field?
Field: a place where a database stores each category of information
They are displayed in columns, each field is identified by a field name
What are data types?
Data type (or field types): the assignment of field data
Text field: can hold any combination of alphanumeric data, but often used to hold words
Numeric fields: store numbers, and can be used to perform calculations
A computational field (or computed field): numeric field that stores the contents of a calculation
Date field: date such as birth days
Memo field: can hold long pieces of text
Object field: holds items such as pictures, video clips, or documents
Hyperlink field: stores hyperlinks to web pages
What is meant by field size?
Field size: defines the maximum number of characters or numbers that a field can hold (a 5 can
hold a 99999)
Records and Tables
What are records and tables in databases?
Record: a group or related fields (students identification information)
A group of related records is called a table (or file)
Primary Keys
Can fields have the same values in the same table?
Yes, two students live in the same town or have the same last name
Primary Key or key field: unique field
What makes a good primary key?
Driver’s license plate numbers
Database Types
Relational, object-oriented, and multidimensional
Relational is the most popular
Relational Databases
What is a relational database?
Relational database: organizes data in a table format by logically grouping similar data into a
relation (table that contains related data)
They are linked to each other by including their primary keys in other tables with related
information
Ex. 1 table has contact and id information of student, 2 table has class and courses enrolled in
Who invented the relational database?
E.F. Codd significantly refined the relational model in 1970
Object-Oriented Databases
What is an object-oriented database?
Object-oriented databases store data in objects, rather than in tables
Based on programming principles
They can process requests for information faster than can relational databases
Why would I use an object-oriented database?
Adept at handling unstructured data: includes non-traditional data such as audio clip, video
clips, pictures, and extremely large documents, this data is known as binary large object (BLOB)
because it is encoded in binary form
Many object-oriented databases use object query language (OQL), which is similar to SQL
(structured query language) a standard language used to construct queries to extract data from
databases
Multidimensional Databases
What is a multidimensional database?
Multidimensional database: stores data in more than two dimensional tables
In a cube format where each cube has a measure attribute: main type of data that the cube is
tracking
Other elements are known as feature attributes: which all describe the measure attribute in
some meaningful way
Each feature attribute could have different levels within
What are the advantages of multidimensional databases?
They can easily be customized to provide information to a variety of users (based on their
needs), and they can process data much faster than pure relational databases can
This database design is good for really large databases that offer instant customization to a
users needs ex. eBay
Database Management Systems: Basic Operations
Databases are created and managed using a data base management system (DBMS): specially
designed application software (ex. Oracle Database or Microsoft Access) that interacts with the
user, other applications and the database to capture and analyze data.
Four main operations of DBMS:
1. Creating databases and entering data
2. Viewing, and sorting data
3. Querying (extracting) data
4. Outputting data
Creating Databases and Entering Data
How do I exactly create a database with DBMS?
First define the field that must be captured, by using a description of the data
The description is contained in the data dictionary or database schema: which defines the
name, data type, and length of each field in the database
How do I know what fields are needed in my database?
Keep things separate, so they can be individually extracted later
What does a data dictionary look like, and how do I create one?
Microsoft Access: called Field Properties box
1. Field name
2. Define data type
3. Set maximum field size
4. Set a default value for a field: the default value the field has unless the user enters
another value
Attributes such as field type and data are called metadata
Metadata: data that describes other data
What happens if I forgot to define a field in the data dictionary or if I want to add another
one later?
That’s fine; just make sure you have all the data together
Inputting Data
How do I get data into the database?
Input it
How can I make manual entry into a database more convenient?
Input form: provides a view of the data fields to be filled, with appropriate labels to assist
database users in populating the database
Data Validation
How can I ensure that only valid data is entered into the database?
Data validation: the process of ensuring that data entered into the database is correct and
complete
Validation rule: set up in a database to alert the user if a clearly wrong entry is entered in the
field (ex. 10 digit phone numbers)
Common types of validation checks include: range, completeness, consistency, and alphabetic
and number checks
How does a range check work?
Range check: ensures that the data entered into the database falls within a certain range of
numbers
Set a field constraint: (a property that must be satisfied for an entry to be accepted into the field)
What does a completeness check accomplish?
Completeness check: ensures that all fields defined as “required” have data entered into them
What is the function of a consistency check?
Consistency check compares the values of data in two or more fields to see if values are
reasonable (between different schools)
How are alphabetic and numeric checks used?
Alphabetic checks: confirms that only textual characters are entered in a field
Number checks: confirms that only numbers are entered in a field
Structured Query Language (SQL)
It uses relational algebra: use of English-like expressions that have variables include table
names, field names, or selection criteria for the data you wish to display
A select query displays a subset of data from a table based on the criteria you specify
Select (field name 1)
From (Table name)
Where (selection criteria)
(may need more detail)
Viewing and Sorting Data
How can I view the data in a data-base?
By browsing
How can I reorder records in a database?
Sort a database into the order that you need, the sort button on the top
What if I want to find a particular piece of data in a database?
Let you query data to enable you to find what you’re looking for
Extracting or Querying Data
What is a query?
Query: question or inquiry
Database query: a question that you ask the database so this provides you with records you
wish to view
Is querying a database as simple as just asking the proper question?
Modern DBMSs contain a query language, most popular language today is structured query
language or SQL
Do I have to learn a query language to develop queries for my database?
Query wizard, which helps you make appropriate SQL commands
Outputting Data
How do I get data out of a database?
Print it
Can I transfer data from a database to another software application?
Export data: putting data into an electronic file in a format that another application can
understand
Relational Database Operations
Relationship: a link between tables that defines how data is related
To establish a relationship between two tables both tables must have a common field
One-to-one relationship: a record in one table (parking space)
Many-to-many relationship: records in one table being related to multiple records in a second
table and vice versa
Normalization of Data
How do I decide which tables I need and what data to put in them?
Normalization of the data: recording the data only once
What can be done to fix the table in Figure 11.25
Only cut the table down to minimum class requirements
How do I get data in the tables to work together now that it is split up?
The tables must have a common field (column)
Foreign key: primary key of another table that is included for purposes of establishing
relationships with that other table, they contain the same data but not necessarily the same field
names
How do I ensure that a foreign key field contains a valid primary key from the related
table?
Enforce referential integrity: for each value in the foreign key of one table, there is a
corresponding value in the primary key of the related table (double checks whether its valid)
Who manages the data in a database?
Database administrators (DBAs) are the IT professionals responsible for designing constructing,
and maintaining databases, they make sure everything is running smoothly and use MySQL
Enterprise Dashboard screen which is a tool used to review the performance of a database
Data Storage
Small enterprises= 1 place is acceptable
Large multiple locations of your data= large data repositories called data warehouses and data
marts
Data Warehouses
What is a data warehouse?
Data warehouse: large-scale electronic repository of data that contain and organizes all the data
related to an organization in one place
Is data in a data warehouse organized the same way as in a normal database?
Its organized by subject (car insurance information vs. life insurance information in a policy
sales subject)
Alibaba is one of the world’s largest business to business database
Are data warehouses much larger than conventional databases?
Data warehouses are not operational in nature, but rather archival, the data is time-variant data:
the data doesn’t all pertain to one period in time (allows for the examination of the past and
present history of consumers purchasing patterns so that future predictions can be made)
Populating Data Warehouses
How are data warehouses populated with data?
From 3 sources: internet sources (company databases), external (suppliers, vendors), and
customers or visitors to a company’s website
Internal: includes spreadsheets and other ad hoc analysis tools that may contain data that
needs to be loaded into the warehouse
External: billing information, shipment methods
Customers: can be monitored through the clickstream of the company
What Is a clickstream, and why is it important?
Captures user information about each click the users make as they navigate through the
website, it helps managers asses the effectiveness of a Web site
Data Staging
Does all source data fit into the warehouse?
No two source databases are the same but in different formats
Data staging: formatting the information
Steps:
1. Extraction of the data from source data-bases
2. Transformation (reformatting) of the data
3. Storage of the data in the warehouse
The nature and complexity of the source data determines the complexity of the data staging
process
Once the data is stored in the data warehouse. How can it be extracted and used?
Querying, and to get better querying results:
Online analytical processing (OLAP) software provides standardized tools for viewing and
manipulating data in a data warehouse. OLAP tools enable flexible views of the data, which
software users can change easily
Data marts
Is finding the right data in a huge data warehouse difficult?
Data mart: small slices of a data warehouse, it pertains to information related to a single
department
Managing Data: Information Systems
Information system: software-based solution used to gather and analyze information (ex.
Amazon;s president)
Information systems fall into one of five catagories: office support, transaction-processing
systems, management information systems, decision support systems, enterprise resource
planning (ERP)
Office Support Systems
What does an office support system accomplish?
Office support system (OSS): designed to improve communications and assist employees in
accomplishing their daily tasks (ex. Microsoft Office: word processing spreadsheet database,
presentation programs)
Transaction-Processing Systems
What is a transaction-processing system?
Transaction-processing system (TPS): keeps track of everyday business activities (invoices,
transactions, useful for Universities)
How do transactions enter a TPS?
Manually, electronically (computerized) transactions are processed in batches or real time
What is batch processing?
Batch processing: means that transaction data is accumulated until a certain point is reached,
and the several transactions are processed all at once (more efficient with time when doing
physical work)
How does real-time processing work?
Real-time processing means that the database is queried and updates while the transaction is
taking place (seats available in a class)
Online transaction processing (OLTP) ensures that the data in the TPS is as current as possible
Management Information Systems
What is a management information system?
Management information system (MIS): provides timely and accurate information that enables
managers to make critical business decisions
What does an MIS provide that a TPS does not?
Detail report: provides a list of the transactions that occurred during a certain time period
Summary report: provides a consolidated picture of detailed data (show visual and calulations)
Exception report: shows conditions that are unusual or that need attention by users of the
system
Decision Support Systems
What is a decision support system?
Decision support system (DSS): designed to help managers develop solutions for specific
problems
What does a decision support system look like?
Internal and External Data Sources
What are internal and external data sources for decision support systems?
Internal: from the company
External: source not owned by the company
Model Management Systems
What function does a model management system perform?
Model management system: software that assists in building management models in DSSs
Model management tool: an analysis tool that through the use of internal and external data,
provides a view of a particular business situation for the purpose of decision making
Knowledge-Base Systems
What is a knowledge-based system, and how is it used in decision support systems?
Knowledge-based support system: provides additional intelligence that supplements the user’s
own intellect and makes the DSS more effective, it can be an expert system: tried to replicate
the decision-making process of human experts to solve specific problems
Another knowledge-base system is a natural language processing (NLP) system: enables users
to communicate with computer systems using a natural spoken or written language instead of
using a computer programming language (speaking to a computer, speech recognition)
All knowledge-based systems fall under AI
Artificial Intelligence (AI): branch f computer science to create computers that think like humans
How does a knowledge-based system help in the decision-making process?
Fuzzy logic: enables the interjection of experiential learning into the equation by considering
probabilities (ex. If Amazon sells a certain book it can suggest that those buyers will buy another
book at a 40% chance)
Enterprise Resource Planning Systems
What is an enterprise?
Enterprise: any business entity large or small
What does an enterprise resource planning system do?
Enterprise resource planning (ERP) system: is a broaf based software system that integrates
multiple data sources and ties together the various processes of an enterprise to enable
information to flow more smoothly, they allow for a common database to store and integrate
information.
The objective of ERP systems is to accumulate all information relevant to running a business in
a central location and make it readily available to whoever needs that information to make
decisions
Data mining
Data mining: process by which great amounts of data are analyzed and investigated
The objective is to spot significant patterns or trends within the data that would otherwise not be
obvious
Why do businesses mine their data?
To understand their customers better
How do businesses mine their data?
Through:
Classification: analyze data, managers need to clarify it (ex. Good credit risks vs. bad credit
risks)
Estimation: the record either fits the classification criteria or it doesn’t
Affinity grouping (or association rules): managers can determine which data goes together
Clustering: involves organizing data into similar subgroups, or clusters, the data-mining software
makes the decisions and the managers determine whether the clusters are meaningful
Description and visualization: describe data so that managers can visualize it, and helps to
interpret in different and meaningful ways
e elevleen ven
summary
summary
chapter
Object-oriented databases store data in
objects, not in tables. The objects also
contain instructions about how the data is
to be manipulated or processed. Multidimensional
databases represent data in threedimensional
cubes to enable faster retrieval
of information from the database.
4. What do database management
systems do?
Database management systems (DBMSs) are
specially designed applications (such as
Oracle or Microsoft Access) that interact
with the user, other applications, and the
database itself to capture and analyze data.
The main operations of a DBMS are creating
databases, entering data, viewing (or browsing)
data, sorting (or indexing) data, extracting
(or querying) data, and outputting data.
A query language is used to extract records
from a database. Almost all relational databases
today use structured query language,
or SQL. However, most DBMSs include
wizards that enable you to query the
database without learning a query language.
The most common form of output for any
database is a printed report.
5. How do relational databases organize
and manipulate data?
Relational databases operate by organizing
data into various tables based on logical
groupings. Because not all of the data in a
relational database is stored in the same
table, a methodology must be implemented
to link data between tables. In relational
databases, the links between tables that
define how the data is related are referred to
as relationships. To establish a relationship
between two tables, both tables must have a
common field (or column). Once linked,
information can be drawn from multiple
tables through the use of queries (for onscreen
viewing of data) or report generators
(used to produce printed reports).
1. What is a database, and why is it
beneficial to use databases?
Databases are electronic collections of
related data that can be organized so that it
is more easily accessed and manipulated.
Properly designed databases cut down on
data redundancy and duplicate data by
ensuring relevant data is recorded in only
one place. This also helps eliminate data
inconsistency, which comes from having
different data about the same transaction
recorded in two different places. When
databases are used, multiple users can share
and access information at the same time.
Databases are used any time complex
information needs to be organized or more
than one person needs to access it. In these
cases, lists (which are used to keep track of
simple information) are no longer efficient.
2. What components make up a
database?
The three main components of a database
are fields, records, and tables. A category of
information in a database is stored in a field.
Each field is identified by a field name,
which is a way of describing the field. Fields
are assigned a data type that indicates what
type of data can be stored in the field.
Common data types include text, numeric,
computational, date, memo, object, and
hyperlink. A group of related fields is a
record. A group of related records is a table
or file. To keep records distinct, each record
must have one field that has a value unique
to that record. This unique field is a primary
key (or a key field).
3. What types of databases are there?
The three major types of databases currently
in use are relational, object-oriented, and
multidimensional. Relational databases are
characterized by two-dimensional tables of
data in which a common field is maintained
in each of two tables and the information
in the tables is linked by this field.
6. What are data warehouses and data
marts, and how are they used?
A data warehouse is a large-scale electronic
repository of data that contains and organizes
in one place all the relevant data related
to an organization. Data warehouses often
contain information from multiple databases.
Because it can be difficult to find
information in a large data warehouse, small
slices of the data warehouse called data marts
are often created. The information in data
marts pertains to a single department within
the organization, for example. Data
warehouses and data marts consolidate
information from a wide variety of sources
to provide comprehensive pictures of
operations or transactions within a business.
7. What is an information system, and
what types of information systems
are used in business?
Information systems are software-based
solutions that are used to gather and analyze
information. Information systems fall into
one of five categories. An office support system
(OSS) is designed to assist employees
summary
in accomplishing their day-to-day tasks and
improve communications. A transactionprocessing
system (TPS) is a system that is
used to keep track of everyday business
activities. A management information
system (MIS) provides timely and accurate
information that enables managers to make
critical business decisions. A decision support
system (DSS) is a system designed to
help managers develop solutions for specific
problems. An enterprise resource planning
(ERP) system is a large software system that
gathers information from all parts of a business
and integrates it to make it readily
available for decision making.
8. What is data mining, and how does it
work?
Data mining is the process by which large
amounts of data are analyzed to spot otherwise
hidden trends. Through processes such
as classification, estimation, affinity grouping,
clustering, and description (visualization),
data is organized so that it provides
meaningful information that can be used by
managers to identify business trends.
553
6. A(n) __________ database organizes
data in a cube format.
a. relational
b. object-oriented
c. rectangular
d. multidimensional
7. Which is NOT one of the four main
operations of a DBMS?
a. Consolidating data
b. Entering data
c. Sorting data
d. Querying data
8. Comparing data values to ensure reasonableness
is an example of a(n)
a. alphabetic check.
b. completeness check.
c. range check.
d. consistency check.
9. A data system that is a subset of a
larger system is known as (a)n
a. data mart.
b. office support system.
c. data warehouse.
d. transaction-processing system.
10. An electronic system used to keep
track of everyday business activities
is an example of a(n)
a. transaction-processing system.
b. decision support system.
c. expert system.
d. knowledge-based system.
1. Having the different birthdates for
the same person on two different lists
is an example of
a. data redundancy.
b. data inconsistency.
c. data disparity.
d. data duplication errors.
2. Which of the following is NOT one of
the three main advantages of using
databases?
a. Promotion of data integrity.
b. Data can be easily shared.
c. Elimination of data recording
errors.
d. Flexible use of data.
3. A group of related fields in a
relational database is called a
a. primary key. c. record.
b. field string. d. table.
4. An example of a good primary key
is a(n)
a. order number.
b. person’s first name combined
with their last name.
c. name of a pet.
d. street address.
5. A primary key
a. should always contain only
numbers.
b. is always unique for each record
in a database.
c. does not have to be unique for
every record in a database.
d. is only used in object-oriented
databases.
Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.
Multiple Choice
True–False
__F__ 1. A query is used to transfer information into a database.
__T__ 2. Completeness checks ensure that only reasonable data values are entered into a
database.
__F__ 3. Reducing incorrect or incomplete data by recording data in only one place is called
data optimization.
__T__ 4. An expert system attempts to replicate the decisions made by a live person.
__F__ 5. Data mining cannot be used to spot customer trends.
Chapter 12: behind the scenes
Networking and Security in the business world
Networking Advantages
Network: a group of two or more computer/nodes that are configured to share
information and resources
What advantages do businesses gain from network?
Networks increase productivity: sharing information, communicate them effectively
Networks enable expensive resources to be shared: share printers, which removes the
need for duplicate devices
Networks facilitate knowledge sharing: serve the needs of many people at one time and
increase the availability of data
Networks enable software sharing: installing a software on a network to avoid installing
the program on every computer
Networks facilitate Internet connectivity:
Networks enabled enhanced communication: social networking tools
Are there disadvantages of using networks?
They can be very complex
Personnel are usually required to maintain them: network administrators
Requires equipment and software
Client/Server Networks
Client/server networks contains severs as well as client computers, they are more
efficient and faster than P2P networks
Does my home network have a server?
No, its only P2P, the computers act as both clients and servers when appropriate
When shouldn’t peer-to-peer network be used?
When the network expands above 10 users, because it’s harder to control software
updates that are required, and the speed is reduced
Besides having a centralized server, what makes a client/server network different
from a peer-to-peer network?
Client/server networks have increased scalability
Scalability: more users be be added easily without affecting the performance of the
other network nodes
Peer-to-peer networks are decentralized
Decentralized: users are responsible for creating their own data backups and for
providing security for their computers
Client/server networks do all the tasks for the nodes, and that’s known as a centralized
method
Classifications of Client/Server Networks: LANs, WANs and MANs
LAN: house size
WAN: college size
MAN: city size
What sort of network connects devices such as smartphones and Bluetooth
headsets?
Personal area network: (PAN): network used to connect Bluetooth devices
What other sort of networks do businesses use?
Intranet: private network that is used exclusively by a select group of individuals
They use Transmission Control Protocol/ Internet Protocol (TCP/IP)
Intranets are good for groupware
Extranet: only certain individuals or corporations can access it, a person can decide
who is permitted into the server
Extranets are useful for enabling electronic data change (EDI) which allows for the
change of large amounts of business data
What security tools do intranets and extranets use?
Virtual private network (VPN), they use special security technologies and protocols that
enhance security, enabling data to transverse the Internet as securely as if it were on a
private leased line
VPN needs tunnelling
Tunnelling: data packets are placed inside other data packets; the external packets are
encrypted and understood by sending and receiving hardware, this communication is
known as tunnel interface
Construction Client/Server Networks
Server: at least one computer on a client/server network
Networking topology: the layout and structure of the network
Transmission media: use cables for high throughput
Network operating system (NOS) software: usually already on the OS
Network adapter: all nodes on the network require adapters
Network navigation device: routers, switches, bridges are needed to move data signals
around the network
Servers
What types of servers are found on larger client/server networks?
Dedicated server: server used to fulfill one specific function, such as handling a gaming
server, they help with reducing the load on the main server
What are authentication and file servers?
Authentication server: server that keeps track of who is logging on to the network and
which services on the network are available to each user
File server: server that stores and manages files for network users
What functions do dedicated servers handle?
Any repetitive task: print, application, database, e-mail, communication, and Web
servers
Print Servers
How does a print server function?
Print servers: manage all client requested printing jobs for all printers on a network
How does the printer know which documents to print?
Print queue: software holding area for print jobs
Application Servers
What function does an application server perform?
Application server: acts as a repository for application software where it can be
accessed, updated, and upgraded
Database Servers
What does a database server do?
Database server: provides client computers with access to information stored in
database at the same time
E-mail Servers
How is e-mail handled on a large client/server network?
E-mail server: process and deliver incoming and outgoing e-mail (like a post carrier)
Communications Servers
What type of communications does a communications server handle?
Communications server: handles all communications between the network and other
networks, including managing Internet connectivity (heavy load, and usually only server
that requires internet)
Web Servers
What function does a Web server perform?
Web Server: host web sites so it will be available through the Internet
They run specialized software such as Apache HTTP server, and Microsoft Internet
Information Services (IIS) that enable them to host Web pages
Network Topologies
Network topologies: physical or logical arrangement of computers, transmission, media
(cable), and other network components
Physical topology: refers to the layout of the “real” components of the network
Logical topology: refers to the virtual connections among network nodes
Bus Topology
What does a bus topology look like?
Bus/linear bus topology: all computers are connected in sequence on a single cable,
this was most often deployed in P2P networks
Now legacy technology with wireless technology that it doesn’t support very well
Data collisions: happens when two computers send data at the same time and the sets
of data collide somewhere in the media, are problems on all networks
On bus topology’s data collusion was fairly common as one communication medium
was used
How does data get from point to point on a bus network?
When data is safe to send (no other computer is sending data), the sending computer
broadcasts the data onto the media
Data is broken down into packets, each packet contains the address of the computer it
is sending too, and the “hearing” computer takes in the data as it receives matching
address
Bus network is a passive topology as all the nodes listen for the right address
At the end of the bus network there is a terminator that absorbs a signal that didn’t go
through to a node
What are the advantages and disadvantages of bus networks?
Low cost, simplicity
Break in the medium causes communication disruptions
Ring Topology
What does a ring topology look like?
Ring/loop topology: data flows around a circle from device to device in one direction
Data packets are sent in token
Ring/loop is commonly called token-ring topology
How does a token move data around a ring?
Token is grabbed by a computer that needs to transmit data, the computer holds onto
the token until it has finished transmitting
Usually only one token is on a ring loop
Token method: when token is completed in transmission, the sending node creates a
new token
Ring topology: means that nodes participate in moving data through the network, large
networks have the capability to use multiple tokens to help move data faster
Is ring technology better than bus technology?
Offers equal chance for all nodes to send tokens, easier to expand than a bus, but if
one computer fails the whole network can fail
If a node must be added the whole network halts
Star Topology
What is the layout for a star topology?
Star topology: most widely deployed client/server network layout today
The nodes connect to a central communications device called a switch in a pattern
resembling a star, the switch receives a signal from the sending node and retransmits it
to the node on the network that needs to receive the signal
Star networks usually use the Ethernet protocol
Is the switch is broken the network stops working
Protocol: set of rules for exchanging communication
Ethernet protocol is a type of network topology, the communications protocol that can
be used in all 3 types of topologies
How do computers on a star network avoid data collisions?
CSMA/CD (carrier sense multiple access with collision detection)
It verifies that no other computer is transmitting data signals
What happens when the signal collide?
A computer in-between sends a jam signal to all networks alerting them that a collision
has occurred, the original computers that sent the data stop transmitting and wait a
random amount of time before retransmitting their data signals
What are the advantages and disadvantages of a star topology?
Easy to add nodes, nodes can be off for the whole network to work
Troubleshooting is easier with a switch
Disadvantages: cost used to be because of expensive cable
Comparing Topologies
What topology is the best one?
Can topologies be combined within a single network?
Hybrid topology
Transmission Media
Transmission media: comprises of the routes that data takes to flow between devices
on the network
Why are wired connections used in business networks?
Wired connections have higher throughput, and businesses use desktops that are
cheaper than notebooks
Wired Transmission Media
What types of cable are commonly used for network?
Home networks: twisted-pair cable
Business networks: twisted pair, coaxial, and fiber optic
What are the important factors in choosing a cable type?
Maximum run length
Bandwidth
Bend radius (flexibility)
Cable cost
Installation costs
Susceptibility to interference: electromagnetic interference (EMI), when the cable is
exposed to strong electromagnetic fields, radio frequency interference (RFI) (by
broadcast sources ex. TV, radio signals)
Signal transmission methods: light (fiber) or electric pulses (twisted pair, coaxial)
Twisted-Pair Cable
What does twisted-pair cable look like?
Twisted-pair cable: consists of pairs of copper wires twisted around each other and
covered by protective sheath
Shielded twisted-pair cable (STP): if the wire has a layer of foil around it
Unshielded twisted-pair (UTP) cable: if it doesn’t have a layer of foil around it
What type of UTP cable are available?
Category 6 (Cat 6)
Category 6a (Cat 6a)
Cat 6 can handle a bandwidth of 1 Gbps
Cat 6a 10 Gbps
Coaxial Cable
What does coaxial cable look like?
Coaxial cable: used for televisions: the core, solid layer of nonconductive insulating
material, layer of braided metal shielded covers the insulation from interference,
external jacket of light weight plastic covers the internal cable components
Fiber-Optic Cable
What does fiber-optic cable look like?
Fiber-optic cable: comprised of a glass or plastic fiber through which the data is
transmitted
How does fiber-optic cable differ from twisted-pair and coaxial cable?
Electric and light transmission of signals, the fiber-optic is not affected by EMI, and RFI
Wireless Media Options
What wireless media options are there?
Wireless media: usually add-ons that extend or improve access to a wired network
Are there standards defined for wireless communication?
802.11n standard
Comparing Transmission Media
So who decides which medium is best for client/server networks?
Network engineers: specialize in the design and deployment of networks and are
responsible for selecting network topology and media types
Network Operating Systems
Network operating system (NOS) needs to be installed on each client computer and
server
Do peer-to-peer networks need special NOS software?
No
How does NOS software differ from operating system software?
OS is designed to facilitate communication between the software and hardware
components of your computer
Windows Server 2008 R2 is NOS for servers in a client/server network
How does the NOS control network communications?
Each NOS has its own proprietary communications language, file management
structure, and device management structure, the NOS also sets the controls and
protocols
Proprietary networking protocols that exist: Novell Internetwork Packet Exchange (IPX),
Microsoft NetBIOS Extended User Interface (NetBEUI), an Apple File Protocol (AFP)
Many companies just use TCP/IP protocol as standard
Can a network use two different NOSs?
Many large corporate networks use several different NOSs at the same time, for
different operating OS and some NOSs are good for certain things
Network Adapters
Network adapters: devices that perform specific tasks to enable computers to
communicate on a network, they are called network interface cards (NIC) on computers
What do network adapters do?
1. They generate high-powered signals to enable network transmissions
2. They are responsible for breaking the data into packets and preparing the
packets for transmission across the network
3. They act as gatekeeper for information flowing to and from the client computer
Are there different types of network adapters?
Ethernet compliant as it’s the standard, but you can get fiber optic cable inputs now as
well
Do wireless networks require network adapters?
Yes, wireless network interface cards (NIC)
The network must also have wireless access points
Wireless access point (WAP): gives wireless dives a sending and receiving connection
point to the network
Do network adapters require software?
Device driver: it enables the network adapter to communicate with the server’s
operating system and with the OS of the computer
What are my options if I’m not located in range of a wireless network?
Get an adapter from a wireless internet provider
Network Navigation Devices
MAC Addresses
How do data packets know where to go on the network?
Media access control (MAC) address ex. 01:40:87:44:79:A5
MAC addresses have six two position characters
The first three sets of character specify the manufacturer of the network adapters, the
second set of characters make up a unique address
Are MAC addresses the same as IP addresses?
No, MAC address is used for identification purposes internally on a network
IP address is the external address for the internet
How does a data packet get a MAC address?
Frame: container that can hold multiple data packets
NOS delivers a frame to the MAC address
What delivers the frames to the correct device on the network?
MAC address
Are MAC addresses useful for anything besides identifying a particular network
device?
They can be used to enhance network security
Only authorized MAC addresses can be allowed on a network
Switches and Bridges
Which devices are used to route signals through a single network?
Switch: makes decisions, based on the MAC address of the data, as to where the data
is to be sent and directs it to the appropriate network node
Do all networks need a switch?
On Ethernet networks
Are switches sufficient for moving data efficiently across all sizes of networks?
Larger networks need the network to be broken down into multiple segments known as
collision domains
Bridge: a device that is used to send data between these different collision domains
Routers
What device does a network use to move data to another network?
Router: looks at IP addresses
Network Security for Client/Server Networks
What sources of security threats do all network administrators need to watch for?
Human errors and mistakes: deleting, and overwriting software and documents
Malicious human activity: virus etc…
Natural events and disasters: floods, fire
Who and what does a college network need to be secure against?
Hackers for information
Authentication
How does a college ensure that only authorized users access its network?
Authentication, login or possessed object (smart key)
How do most colleges handle authentication on their networks?
ID and password
Can hackers use my account to log on to the network?
Yes. Its impersonation
Hacker might use brute force attack
Access Privileges
How can I gain access to everything on the college network?
Unless you’re the admin
RFID: radio frequency identification tag
Could help consumers shop easier as the products with RFID tags can be scanned
automatically and the billing could be processed
How does restricting access privileges protect a network?
So users only stay where they are supposed to
Aside from improper access, how else do data theft and destruction occur?
Industrial espionage, stealing documents
Flash drives could have Trojan horses on them, and they could act as “skeleton keys” to
the company’s network
How should network administrators protect their networks from portable storage
devices?
1. Educate employees
2. Create policies regulating the use of media in the workplace
3. Install security measures such as firewalls and antivirus software
4. Lock USB drives: DeviceLock and Safend
Physical Protection Measures
Can any physical measures be taken to protect a network?
Lock all the physical network hardware away
Only access card readers can allow entrance into the room
Biometric authentication device, human biology to identify authorized users
Firewalls
Is the college Internet connection vulnerable to hackers?
Yes
Does the firewall on my college’s network work the same way as a personal
firewall installed on a home network does?
Use packet screening: makes sure data packets are valid by internal network users,
works also when data is leaving the network, to make sure no Trojan horses are
emitting data
What other security measures does the firewall on a client/server networks use?
Bastion host: heavily secured server located on a special perimeter network between
the company’s secure internal network and the firewall
If a hacker attacks a bastion host, the internal network is still safe, and the attack can be
detected
Bastion hosts are often configured as proxy servers
Proxy server: acts as a go-between, connecting computers on the internal network with
those on the external network
summary
chapter
4. What components are needed to
construct a client/server network?
Client/server networks have many of the
same components of peer-to-peer networks
as well as some components specific to
client/server networks, including servers,
a network topology, transmission media,
network operating system (NOS)
software, network adapters, and network
navigation devices.
5. What do the various types of servers
do?
Dedicated servers are used on large networks
to increase efficiency. Authentication
servers control access to the network and
ensure that only authorized users can log
on. File servers provide storage and management
of user files. Print servers manage
and control all printing jobs initiated on a
network. Application servers provide access
to application software (such as Microsoft
Office). Database servers store database files
and provide access to users who need the
information in the databases. E-mail servers
control all incoming and outgoing e-mail
traffic. Communications servers are used to
control the flow of information from the
internal network to outside networks (such
as the Internet). Web servers are used to host
a Web site.
6. What are the various network
topologies (layouts), and why is
network topology important in
planning a network?
In a bus topology, all nodes are connected to
a single linear cable. Ring topologies are
made up of nodes arranged roughly in a
circle. The data flows from node to node in a
specific order. In a star topology, nodes are
connected to a central communication
device (a switch) and branch out like points
of a star. A hybrid topology blends two or
more topologies in one network. Each
topology has its own advantages and
disadvantages. Topology selection depends
on two main factors: (1) the network budget,
and (2) the specific needs of network users
(such as speed or fair allocation of
resources).
1. What are the advantages of a
business network?
A network enables employees to communicate
with each other more easily, even over
large distances. Networks also enable
resources, such as printers, to be shared,
avoiding the cost of providing these
resources to individual employees. Software
can be deployed from a network server,
thereby reducing the costs of installation
on each user’s computer. Finally, networks
enable employees to share an Internet
connection, avoiding the cost of providing
each employee with a dedicated Internet
connection.
2. How does a client/server network
differ from a peer-to-peer network?
A client/server network requires at least one
server to be attached to the network. The
server coordinates functions such as file
sharing and printing. In a peer-to-peer
network, each node connected to the network
can communicate directly with every
other node on the network. In a client/
server network, a separate device (the
server) exercises control over the network.
Data flows more efficiently in client/server
networks than in peer-to-peer networks. In
addition, client/server networks have
increased scalability, meaning users can be
added to the network easily.
3. What are the different classifications
of client/server networks?
Local area networks (LANs) are small
groups of computers (as few as two) and
peripherals linked together over a small
geographic area. A group of computers on
the floor of the office building where you
work is most likely a LAN. Wide area
networks (WANs) comprise large numbers
of users (or of separate LANs) that are miles
apart and linked together. Corporations
often use WANs to connect two or more
branches (such as an office in California and
one in Ohio). Sometimes government organizations
or civic groups establish WANs to
link users in a specific geographic area (such
as within a city or county). These special
WANs are known as metropolitan area
networks (MANs).
7. What types of transmission media are
used in client/server networks?
In addition to wireless media, three main
cable types are used: twisted-pair cable,
coaxial cable, and fiber-optic cable. Twistedpair
cable consists of four pairs of wires
twisted around each other to reduce
interference. Coaxial cable is the same type
of cable used by your cable TV company to
run a signal into your house. Fiber-optic
cable uses bundles of glass or plastic fiber to
send signals using light waves. It provides
the largest bandwidth but is expensive and
difficult to install. Wireless media uses radio
waves to send data between nodes on a
network.
8. What software needs to run on
computers attached to a client/server
network, and how does this software
control network communications?
Network operating system (NOS) software
needs to be installed on each computer and
server connected to a client/server network
to provide the services necessary for the
devices to communicate. The NOS provides
a set of common rules (called a protocol) that
controls communication between devices on
the network.
9. How do network adapters enable
computers to participate in a
client/server network?
Without a network adapter, a computer
could not communicate on a network. A
network adapter provides three critical
functions. First, it takes low-power data
signals generated by the computer and
converts them into higher-powered signals
that can traverse network media easily.
summary
Second, it breaks the data generated by
the computer into packets and packages
them for transmission across the network
media. Last, it acts as a gatekeeper to
control the flow of data to and from the
computer.
10. What devices assist in moving data
around a client/server network?
Switches are devices that read the addresses
of data packets and retransmit a signal to its
destination instead of to every device connected
to the switch. Bridges are devices
used to send data between two different
segments (collision domains) of the same
network. Routers are used to route data
between two different networks (such as between
a corporate network and the Internet).
11. What measures are employed to keep
large networks secure?
Access to most networks requires authentication
procedures (such as having users
enter a user ID and password) to ensure that
only authorized users access the network.
The system administrator defines access
privileges for users so that they can access
only specific files. Network equipment is
physically secured behind locked doors,
which are often protected by biometric authentication
devices. Biometric devices, such
as fingerprint and palm readers, use unique
physical characteristics of individuals for
identification purposes. Firewalls are
employed to keep hackers from attacking
networks through Internet connections.
Packet screeners review traffic going to and
from the network to ascertain whether the
communication was generated by a
legitimate user.
Multiple Choice
1. Which of the following is not an advantage
of installing a client/server
network in a college?
a. Increased scalability
b. Decentralization of network
security protection
c. Sharing of files and data
d. Sharing of peripherals
2. Which is not a reason why client
server networks are usually installed
in large businesses?
a. Peripherals can’t be shared on
peer-to-peer networks.
b. Dedicated servers make large
networks more efficient.
c. Client/server networks are more
scalable than peer-to-peer
networks.
d. Client/server networks feature
centralized security.
3. When networks are deployed at two
college campuses 30 miles apart, the
networks would be classified as a
a. WAN. c. PAN.
b. MAN. d. LAN.
4. Which of the following is not necessary
in every client/server network?
a. Network adapters
b. Database server
c. Transmission media
d. NOS software
5. To provide for sharing of an Internet
connection, which server would a
corporate network include?
a. Database
b. Authentication
c. Communications
d. Application
6. Which type of network topology
favors equal access among nodes?
a. Star c. Ring
b. Ethernet d. Bus
7. Fiber-optic cable most likely would
be used in a corporate network
when
a. cost is more important than speed.
b. electrical or magnetic interference
is not present.
c. short cable runs are required.
d. speed is more important than
cost.
8. NOS software is
a. needed on all computers in a
client/server networks.
b. needed only on the servers in a
client/server network.
c. needed only on client computers
in a client/server network.
d. needed only when configuring a
network in a ring topology.
9. On client server networks, switches
a. transfer data between two
networks.
b. route date between two collision
domains on a single network.
c. move data efficiently from node
to node on the network.
d. necessary only in networks using
the ring topology.
10. Providing adequate security on a
corporate network involves all of
these issues, except
a. authentication.
b. packet screening.
c. deploying a bastion host.
d. installing NOS blocking software.
True–False
___T_ 1. Bridges are used to route data between two or more network collision domains.
___T_ 2. Two different types of network topologies can be deployed on the same network.
___F_ 3. Twisted pair cable is never susceptible to magnetic interference.
__F__ 4. Client/server networks are less scalable than peer-to-peer networks.
___F_ 5. A communication server is used to control access on a client/server network.
Thirteen behind the scenes: how the internet works
The Management of the Internet
Who owns the Internet?
No one, but Government entities like NASA own part of the communications infrastructure
Does anyone manage the Internet?
Non-profit organizations
Who pays for the Internet?
Me and you!
The National Science Foundation (NSF) still pays for a large portion of the Internet’s
infrastructure and funds research and development of new technologies
Internet Networking
Connecting to the Internet
How are computers connected to the Internet?
Internet backbone: fastest data routes for the internet
How do the ISPs that form the Internet backbone communicate?
T line: carried digital data over twisted-pair wires
Backbone is now typically an optical carrier (OC) line
How are the ISPs connected to each other?
Network access points (NAPs): they were designed to move large amounts of data quickly
between networks
Internet exchange point (IXP): data-exchange system by private-sector companies
IXPs reduce costs and improve speed with these networks
How do individuals connect to an ISP?
Point of presence (POP): bank of modems, servers, routers, and switches
The Network Model of the Internet
What type of network does the Internet use?
Client/server model
Web server
Commerce server
File server
Do all Internet connections take place in a client/server mode?
Peer-to-peer model, bit torrent
Your computer acts as a client, the tracker makes your computer aware of other users running
Bit Torrent software who have pieces of the file (called seeding), your computer requests the file
from a group of users (called a swarm), the computers transmit the pieces of the file
Data Transmission and Protocols
Why were Internet protocols developed?
Open system: its design would be made public access by any interested party
Were there problems developing an open system Internet protocol?
Developing a new communication method other than circuit switching
Circuit switching: a dedicated connection is formed between two points, and the connection
remains active for the duration of the transmission
This is inefficient with computers, as computers transmits data in a group (or burst) which has
moments of inactivity
Packet Switching
Is they can’t use circuit switching, what do computers use to communicate?
Packet switching: communications methodology that makes computer communication efficient
with data being sent in packets or a data packet
What information does a packet contain?
Packets contain:
1. an address to which the packet is being sent
2. the address from where the packet originates
3. reassembling instructions if the original data was split between packets
4. the data that is being transmitted
5.
Why do packets take different routes, and how do they decide which routes to use
Routers that connect ISPs decide which is the most efficient route
TCP/IP
What protocol does the Internet use for transmitting data?
TCP/IP: transmission control protocol and Internet protocol
Which particular protocol actually sends the information?
IP: internet protocol
IP Addresses and Domain Names
IP Addresses
What is an IP address?
Unique identification number that defines each computer, service, or other device that connects
to the Internet
IP addresses must be registered with the Internet Corporation for Assigned Names and
Numbers (ICANN)
What does an IP address look like?
Dotted decimal number
Will we ever run out of IP addresses?
Internet Protocol version 4 (IPv4) was created
Classless interdomain routing (CIDER): allows a single IP address to represent several unique
IP addresses by adding a network prefix (a slash and number at the end of the last octet
206.13.01.48/25, “/25” is the network prefix.
It indicates that the first 25 bits are used as
the unique network identifier;
Are there other Internet addressing systems?
Internet Protocol version 6 (IPv6): uses 8 groups of 16-bit numbers which is hexadecimal
notation
How does my computer get an IP address?
Static and dynamic addressing
How exactly are dynamic addresses assigned?
Dynamic addressing is normally handled by the dynamic host configuration protocol (DHCP)
which belongs to the TCP/IP protocol suite
The ISP gives the user an IP address from a pool of available addresses
Connection-oriented protocol: two computers set-up the parameters before exchanging data this
is known as handshaking
TCP uses a three-way handshake to establish a connection
What are the benefits of dynamic addressing?
More secure environment by keeping address different
Domain Names
I’ve been on the Internet, so why have I never seen IP addresses?
English is easier to remember and understand domain names (ex. Yahoo.com)
How are domains organized?
Top-level domain (TLD) are standardized pools that have been established by ICANN
Second-level domain: unique within its own top-level
Who controls domain name registration?
ICANN had VeriSign to oversee each TLD and domain name registrar for the .com and .net
domains
DNS Servers
How does my computer know the IP address of another computer?
The URL must be converted into an IP address, to do this the computer consults a database
that is maintained on a DNS (domain name system) server that functions like a phone book for
the Internet
If the search fals the ISP’s Web server will contact one of 13 root DNS servers, each DNS
server knows the location of all the DNS servers that contain the master listings for an entire
top-level domain, and the computer stores the DNS server in its cache for future use
Other Protocols: FTP and Telnet
File Transfer Protocol
How does FTP work?
File transfer protocol (FTP): enables users to share files that reside on local computers with
remote computers
Can you upload files with FTP?
Most FTP sites allow you to upload files, you need a browser that handles FTP transfers or you
need to obtain an FTP client application
Telnet
What is Telnet?
Telnet: both a protocol for connecting to a remote computer and a TCP/IP service that runs on a
remote computer to make it accessible to other computers
Telnet enables you to take control of remote computer (the server) with your computer (the
client) and manipulate files and data on the server as if the server were your own computer.
Used in school networks
How do you use Telnet?
Address, login information
Type “open” of the remote computer
HTTP, HTML, and Other Web Jargon
WWW is actually a group of protocols and software that resides on the Internet
The Web provides an engaging interface for exchanging graphics, video, animations, and other
multimedia over the Internet
HTTP and SSL
Which Internet protocol does a browser use to send requests?
HyperText Transfer Protocol (HTTP)
Hypertext documents are documents in which texts linked to other documents or media (video
clips)
When the browser sends a request, does it do anything to make the information secure?
HyperText Transfer Protocol Secure (HTTPS)
Transport layer security (TLS) and the secure socket layer (TLS) are two protocols that provide
data integrity an security for transmissions over the Internet
HTML/XHTML
How are Web pages formatted?
HTML tagging ex. <b>, where it surrounds an element of text
They are set of rules from marking up blocks of text so that a browser knows how to display
them
Can you see the HTML/XHTML coding of a Web page?
Yes, go to view source on the web browser
XML
How is XML different from HTML/XHTML?
Users can build their own markup languages to accommodate particular data formats and
needs
How has XML influenced other Web page developments?
Mathematical Markup Language (MathML), used to describe mathematical symbols and
formulas
The Common Gateway Interface
Can you use HTML/XHTML to make a Web page interactive?
No they were just used for text based arrangements not interactivity
Common gateway interface (CGI) provides a methodology for which your browser can request
for a program to be executed instead of just being delivered to the browser
CGI programs can be made in almost any programming language
Perl, C, C++
How are CGI programs executed?
All programs are placed in a Cgi-bin directory, which the web site knows that these are
programs that must be executed
This runs on a Web Server rather than inside your browser, it is referred to as a server-side
program
Dynamic HTML
Can Web pages be made more interactive without accessing Web servers?
Dynamic HTML (DHTML) is a combination of technologies HTML/XHTML that is used to create
lively and interactive Web sites
These websites require plug-ins
AJAX facilitates Web application creation, and doesn’t require Web site refreshment for
updating
What is JavaScript?
Application language within HTML/XHTML
How can you easily change the formatting of HTML/XHTML elements?
Cascading style sheet (CSS) is a list of statements that defines in one single location how to
display HTML/XHTML elements
Where does the cascading come in?
With a hierarchy of rules such as background color, the “cascade” of style are ranked according
to their assigned weights
How are the individual components of a Web page organized?
Document object model (DOM) to organize the objects and page elements
Client-Side Applications
Aside from CGI scripts, are there other ways to make a Web site interactive?
Client-side program that has the program running on the client server
The code must be embedded into the HTML/XHTML code using an HTML/XHTML embedded
scripting language
Most populat is JavaScript
Second is an apple, which is Java language
Communications over the Internet
E-mail
Who invented e-mail?
Ray Tomlinson
How does e-mail travel the Internet?
Simple mail transfer (SMTP): responsible for sending e-mail along the Internet to its destination
Where are e-mail servers located?
e-mail ISP e-mail server
If e-mail was designed for text messages, why are we able to send files as attachments?
Uuencode and uudecode were the most popular programs used for encoding and decoding
binary files
1990’s the multipurpose Internet mail extensions (MIME) specification was introduced in 1991 to
simplify attachments
E-mail Security: Encryption and Specialized Software
If e-mail is sent in regular text, can other people read my e-mail?
How do you encrypt e-mail?
Encryption: refers to the process of coding you e-mail so that only the person with the key to
code can decode and read the message
Two types:
Private-key encryption: between two parties, where there is a simple shift of letter to new
positions
Public-key encryption: two keys known as a key pair are created, the key for coding is generally
a public key, and the person who wants to open the code can message you asking for the code
When you receive the message you use your private key to decode it
What type of encryption is used on the Internet?
Pretty Good Privacy (PGP) are tried and true public-key packages
What does a key look like?
A key is a binary number, 10-bit key has 10 positions and might look like: 1001101011
Is a private key really secure?
Yes, its impossible to deduce the private key from the public key, but it can be hacked using
brute force
What is considered a safe key?
128-bit key
What is an easy way for me to try encrypted e-mail?
Many e-mail providers have built in encryption
Hushmail, Comodo SecureEmail
How do businesses protect e-mail?
Securus Systems Ltd. Have developed secure data transmission software that works outside
the conventional SMTP mail servers
How is SafeMessage Software used?
A safe point to point connection is established between the sender’ and recipient’s e-mail boxes
Instant Messaging
What do you need to run instant messaging?
You need a client program to do this
How does instant messaging work?
Is sending an instant message secure?
They’re vulnerable to eavesdropping
A packet “sniffer” listens in
Voice over Internet Protocol (VoIP)
What is Voice over Internet Protocol?
What’s good about VoIP?
Cheaper
How does VoIP work?
How are VoIP security issues being handled?
Firewall, antivirus
Using the Internet to Deliver Computer Services
What is cloud computing?
Cloud computing: using the internet to deliver business services online
Why would a company need cloud computing?
Because its cheaper than doing the stuff yourself
What types of businesses can benefit the most from cloud computing?
Businesses that need to process large amounts of data every once in a while
Is it safe to rely on other companies to process sensitive data?
You have to evaluate the company
th i t hrteiernteen
summary
summary
chapter
4. Why are IP addresses and domain
names important for Internet
communications?
An IP address is a unique number assigned
to all computers connected to the Internet.
The IP address is necessary so that packets
of data can be sent to a particular location
(computer) on the Internet. A domain name
is merely a name that stands for a certain IP
address and makes it easier for people to
remember it. For example, MyWebPage.com
is a domain name and is much easier to remember
than the IP address 124.53.111.14.
DNS servers act as the phone books of the
Internet. They enable your computer to find
out the IP address of a domain by looking
up its corresponding domain name (which
you typed into your browser).
5. What are FTP and Telnet, and how
do you use them?
The file transfer protocol (FTP) enables users
to share files that reside on local computers
with remote computers. Current versions of
browsers enable you to connect to FTP sites
on the Internet to facilitate downloading or
uploading files to and from FTP sites. Telnet
is both a protocol for connecting to a remote
computer and a TCP/IP service that runs on
a remote computer to make it accessible to
other computers. Telnet enables you to take
control of a remote computer (the server)
with your computer (the client) and manipulate
files and data on the server as if you
were sitting in front of that server.
6. What are HTML/XHTML and XML
used for?
The HyperText Markup Language (HTML)
is a set of rules for marking up blocks of text
so that a browser knows how to display
them. Most Web pages are generated with at
least some HTML code. Blocks of text in
HTML documents are surrounded by a pair
of tags (such as <b> and </b> to indicate
bolding). These tags and the text between
them are referred to as elements. By examining
the elements, your browser determines
how to display them on your computer
screen. Because HTML was not designed for
information exchange, eXtensible Markup
Language (XML) was created. Instead of
1. Who owns, manages, and pays for the
Internet?
Management of the Internet is carried out
by several nonprofit organizations and
user groups such as the Internet Society
(ISOC), the Internet Engineering Task
Force (IETF), the Internet Architecture
Board (IAB), the Internet Corporation for
Assigned Names and Numbers (ICANN),
and the World Wide Web Consortium
(W3C). Each group has different responsibilities
and tasks. Currently, the U.S.
government (and subsequently the U.S.
taxpayer) funds a majority of the
Internet’s costs.
2. How do the Internet’s networking
components interact?
Individual computers or networks connect
to the Internet using Internet service
providers (ISPs). These providers vary in
size and work like the physical highway
system. The largest paths, along which
data travels the most efficiently and
quickly, make up the Internet backbone.
Homes and all but the largest businesses
connect to the Internet through these regional
or local connections, which then
connect to the Internet through the entities
that make up the Internet backbone. The
largest businesses, educational centers, and
some government agencies such as NASA
make up the Internet backbone.
3. What data transmissions and
protocols does the Internet use?
Data is transmitted along the Internet
using packet switching. Data is broken
up into discrete units known as packets,
which can take independent routes to the
destination before being reassembled.
Although many protocols are available
on the Internet, the main suite of protocols
used to move information over the Internet
is TCP/IP. The suite is named after the
original two protocols that were developed
for the Internet: the Transmission Control
Protocol (TCP) and the Internet Protocol
(IP). Whereas TCP is responsible for
preparing data for transmission, IP
actually sends data between computers
on the Internet.
chapter
locking users into standard tags and formats
for data, XML enables users to create their
own markup languages to accommodate
particular data formats and needs. XML is
used extensively in e-commerce for exchanging
data between corporations.
7. How do e-mail, instant messaging,
and Voice over Internet Protocol
work, and how is information using
these technologies kept secure?
Simple mail transfer protocol (SMTP) is the
protocol responsible for sending e-mail over
the Internet. As is true of most other Internet
applications, e-mail is a client/server application.
E-mail passes through e-mail servers
whose functions are to store, process, and
send e-mail to its ultimate destination. ISPs
and portals such as Yahoo! maintain e-mail
servers to provide e-mail functionality to
their customers. Your ISP’s e-mail server
uses DNS servers to locate the IP addresses
for the recipients of the e-mail you send.
Encryption software, such as Pretty Good
Privacy (PGP), is used to code messages so
that they can be decoded only by the
authorized recipients.
8. How do businesses use the Internet
to reduce computing costs?
Many businesses are taking advantage of
cloud computing to reduce costs. Cloud computing
refers to business services provided
online by other companies and delivered to
a customer through the Internet. These
services were formerly delivered locally by
company-owned IT departments. A
company might use Amazon.com’s cloud
computing servers, for example, to store
their data instead of purchasing and
installing their own servers. Cloud
computing initiatives, while cost effective,
generate data security concerns because a
third party is managing sensitive data.
7.Individuals connect to the Internet
using
a. points of presence.
b. network access points
c. Internet exchange points.
d. Web servers.
8. Encryption of Internet e-mail
a. requires the use of specially
designed client software.
b. is built into the SMTP protocol.
c. is built into most Web-based
e-mail.
d. is prohibited by the Department
of Homeland Security.
9. For what is PGP used?
a. Creating a secure connection
between client and server
b. Loading Web pages into a
browser
c. Encrypting e-mail messages
d. Uploading files to the Internet
10. Which is a key component of cloud
computing?
a. Increase in IT employee
headcount
b. Decreased computing start-up
costs
c. Delivery of offline computing
services
d. Difficulty in increasing
computing capacity
1. Which is a common protocol used on
the Internet?
a. DNS c. XHTML
b. IP d. PGP
2. Data is sent over the Internet using
a. circuit switching.
b. protocol switching.
c. DNS switching.
d. packet switching.
3. A numeric IP address is usually
represented by an alphanumeric
a. URL.
b. SMTP.
c. routing address.
d. DNS address.
4. IP addresses that are assigned by an
ISP and do not change over long
periods of time are
a. called static.
b. more secure.
c. called dynamic.
d. volatile.
5. Which is the primary Internet protocol
used for viewing Web pages?
a. JavaScript
b. Telnet
c. HTTP
d. TCP/IP
6. What makes interactivity on the Web
possible?
a. HTML c. FTP
b. CGI d. XML
640 Chapter 13 Behind the Scenes: How the Internet Works
Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.
Multiple Choice
True–False
__F__ 1. The costs associated with running the Internet are paid primarily through ISPs
collecting fees from customers and from funding by U.S. government agencies.
__T__ 2. VoIP uses packet switching technology.
_F___ 3. A computer needs the XML address to locate a Web page accurately.
___F _ 4. The main suite of protocols used on the Internet is TCP/FTP.
___F_ 5. Instant messages are generally secure because it provides a message encryption
software
The History of the PC
The first personal computer: The Altair
Altair 8800 first personal computer for $395 or $498 for already built, just had 256bytes of
memory
Worked by entering strings of 1’s and 0’s by flashing lights on the front
Bill Gates and Paul Allen created a program that translates user commands into commands that
the computer can understand (compiling program). Which they sold to Ed Roberts the Altair
developer, The boys later created Microsoft
The Apple 1, and 11
Steve Wozniak who brought his computer ideas ad prototypes to the Homebrew Computing
Club in Palo Alto
Steve Jobs liked Woz’s ideas and they created the Apple 1.
1976 the Apple Computer Company
1977 Apple 2 was born, it had ROM instead of RAM which didn’t require the whole start up to be
rewritten, it was also easier to program for computer enthusiasts
Apple 3 made in 1980, had word processor, spreadsheet, and desktop publishing software
Steve Jobs called the company Apple because it was the perfect fruit it was high in nutrients,
and not easily damaged
Enter the Competition
Commodore, Radioshack, and IBM
Commodore PET and TRS-80
Commodore PET 2001 Jan 1977
TRS-80 1977, 4kb of memory , nicknamed trash-80
The Osborne
Created the first portable computer in April 1988, because it was portable it was an instant
success
Included 64kb of memory, had floppy disk drives, word processing, and spreadsheet
The successor called the executive decreased sales of the Osborne, and the Compaq company
bought Osborne design.
IMB PCs
Started with large mainframe computers for corporations in 1980, and then created its first
personal computer named the IBM PC, where the PC term became the term to describe all
personal computers.
The IBM Pc dominated the field in Jan. 1983.
IBM Pc was the first “man of the year” by Times Magazine
Other Important Advancements
The Important of Basic
Starting languages of: Fortran, Algol, and Cobol which were used to created business financial,
statistical, and engineering programs
Beginner All-Purpose Symbolic Instruction Code (BASIC) was created in 1964. It allowed for an
easy way for early programmers to learn programming. Bill Gates wrote his Altair program with
it.
The Advent of Operating Systems
Steve Wozniack created the Disk 2, floppy disk in 1978
First Apple Computers ran The Control Program for Microcomputers (CP/M), founded by Gary
Kildall
PC’s ran Disk Operating Systems (DOS)
Microsoft created the MS-DOS for IBM computers, which was based on Quick and Dirty
Operating System (QDOS)
The Software Application Explosion: VisiCalc and Beyond
Dan Brinklin and Bob Frankston created the program VisiCalc, a spreadsheet program
Later came Lotus 1-2-3 in 1983
Micosoft Excel 1985
Word Processor, WordStar came out in 1979
Word Perfect, Word for MS-DOS also came in
The Graphical User Interface (GUI)
Desktop for computers, Apple got in on it first
Xerox
Xerox worked on the Alto computer which worked on a What you see is what you get
(WYSIWYG) principle, which had files and folders to organize file management. It created the
Star Office System but it was too expensive for anyone to buy.
The Lisa and Macintosh
The Microsoft computer with a GUI interface
Apple created a cheaper one called the Macintosh, also had smaller floppy drives
The Internet Boom
Now it was easy to work on computers with a GUI, and people plunged into the attraction of the
internet boom in 1993
Microsoft created Internet Explorer in 1995, in Windows 95
Silicon Graphics Inc. by Andreessen created the Netscape commercial Web browser, but it was
later pushed out of business from Microsoft
Making the PC Possible: Early Computers
The Pascalene Calculator and the Jacquard Loom
The Pascalane was the first accurate calculator created by Blaise Pascal in 1642, it could do all
simple calculation (+-/*)
200 Years later Joseph Jacquard created the Jacquard Loom which was an automated weaving
complex that relied on punch card process, which was adopted later on for computers
Babbage’s Engine
Charles Babbage in 1834 designed the first automatic calculator called the Analytical Engine.
Babbage was called the father of computing, as his computer had the Ram and processing
capabilities
The Hollerith Tabulating Machine
Herman Hollerith in 1890, used Jacquard’s punch card concept and apply it to the machine
Hollerith Tabulating Machine, and started the IBM company (international business machines)
because of its success.
The Z1 and the Atanasoff-Berry Computer
Konrad Zuse created the Z1 in 1936, had control unit and separate memory functions
Late 1939 John Atanasoff built the first electrically powered digital computer called the
Atanasoff-Berry Computer (ABC), first to use vacuum tubes instead of switches to store data,
first to use a binary system, have memory that repowered itself upon booting.
The Harvard Mark 1
Howard Aiken and Grace Hopper designed the Mark between 1930’s and 1950. It could do all
four arithmetic operations (+-/*)
Hopper inventor the compiler a program that translates English language instructions into
computer language, he was the first to “debug” a computer when a moth that has flown into the
computer.
The Turing Machine
In 1936 Alan Turing created the hypothetical model that mathematically designed a mechanical
procedure or algorithim. The concept could read, write, and erase symbols written on squares of
infinit tape, this was he precursor to todays RAM.
The ENIAC
The Electronic Numerical Integrator and Computer (ENIAC), a machine used by the army to
calculate the settings used to weapons. It was created by John W. Mauchly and J.Presper
Eckert. It was big and clumsy it used a lot of vacuum tubes and square feet. It was used until
1955.
The UNIVAC
The Universal Automatic Computer completed in 1951 and manufactured by Remington Rand.
It ran on magnetic tape rather than punch cards. It became popular by predicting the outcome of
the Stevenson-Eisenhower presidential race. After that it was considered first-generation
computers and was the last to use computer vacuum tubes to store data.
The Transistors and Beyond
Scientists at the Bell Telephone Laboratories in New Jersey created the transistor which was
other means of storing data. Computers that used these were considered second generation
computers.
In 1958 Jack Kilby invented the first integrated circuit, which had many small transistors within it,
making the computers smaller and lighter. The computers with circuits were considered third
generation computers.
In 1971 Intel created a microprocessor chip, which contained millions of transistors; it was the
CPU or brains of the computer. These computers were considered fourth generation computers
Multiple Choice:
1. What was the name of the first Web browser?
a. Mosaic c. Netscape
b. Internet Explorer d. Firefox
2. Which programming language revolutionized the
software industry?
a. ALGOL c. COBOL
b. BASIC d. FORTRAN
3. Why was the invention of the integrated circuit
important?
a. It enabled computers to store more data.
b. It enabled monitors to display a better image.
c. It enabled more processing memory.
d. It enabled computers to become smaller and lighter.
4. Which computer is touted as the first personal
computer?
a. Altair c. Lisa
b. Commodore PET d. Osborne
5. What was the importance of the Turing machine to
today’s computers?
a. It described a system that was a precursor to
today’s notebook computer.
b. It was the first electronic calculator and a precursor
to the computer.
c. It was the first computer to have a monitor.
d. It described a process to read, write, and erase
symbols on a tape and was the precursor to today’s
RAM.
6. Which computer first stored its operating system in
ROM?
a. Apple I c. Lisa
b. Apple II d. Macintosh
7. What was the first word processing application?
a. Lotus 1-2-3 c. WordPerfect
b. Word for MS-DOS d. WordStar
8. Which components are characteristic of secondgeneration
computers?
a. Transistors
b. Vacuum tubes
c. Integrated circuits
d. Microprocessor chips
9. For what is the Atanasoff-Berry Computer best
known?
a. It was the first computer used to tabulate U.S.
census data.
b. It was the first computer to use the binary system.
c. It was the first computer to incorporate the punchcard
system.
d. It was the first computer used as a mechanical
calculator.
10. Who are the founders of Microsoft?
a. Paul Allen and Bill Gates
b. Bill Gates and Steve Wozniak
c. Steve Jobs and Bill Gates
d. Bill Gates and Gary Kildall